Found 7,068 presentations matching your search
Tractable and Intractable Problems, The P and NP Classes, Polynomial Time Reductions, The NP- Hard a...
Algorithm design techniques include: Brute Force Greedy Algorithms Divide-and-Conquer Dynamic Progra...
Definition of Binary Tree, Introduction to Binary Search Tree, Binary Tree Search Algorithm, Insert ...
Uniform Cost Search (UCS) is a popular search algorithm used in artificial intelligence (AI) for fin...
Dynamic Programming is a technique for algorithm design. It is a tabular method in which it uses ...
This presentation contains the explanation on the topic Huffman algorithm backed by a sample problem...
Regression is one of the most common models of machine learning . Logistic regression is a classifi...
To understand algorithm and flowchart, it is better to refer this Slideshare that I have created. I ...
This paper proposes a new approach to soft decoding for linear block codes called dual simulated ann...
A Complete Presentation about how to Find a LCS of a given Strings Using LCS algorithm. This PPT con...
Deepfake Detection, To Design and Develop a Deep Learning algorithm to classify the video as deepfak...
complete guide to a child with rash. algorithm of diagnosis. includes infectious diseases. final yea...
In linear algebra, the Strassen algorithm, named after Volker Strassen, is an algorithm for matrix m...
algorithm
Markov Chain Monte Carlo-based Shake and Bake algorithm for uniform sampling from the boundary of a ...
The Instagram algorithm can seem annoying but businesses have to learn to be friends with it. Schedu...
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat ...
Expectation Maximization (EM) algorithm is a method that is used for finding maximum likelihood or m...
This presentation gives you a very depth knowledge on algorithm and how to write the logic for a giv...
Power-aware scheduling reduces CPU energy consumption in hard real-time systems through dynamic volt...
This algorithm is used to determine the partial ordering of events in a distributed system and also...
The Time Complexity of an algorithm/code is not equal to the actual time required to execute a parti...
Secure Hash Algorithm 512 (SHA-512) description with figure and equation according to the book of Be...
Algorithm A* Admissibility of A* Recursive Best First Search Escaping local maxima I...