D1,D2,D3 is a subset of samples of young, middle-aged and old age, respectively.
Age-Conditional information gain is
Information gain with work
Have information about the house gain
Information gain on credit conditions
Finally, the information gain value of each feature is compared, and the information gain value of its own house is maximal for the characteristic A3, so the feature A3 is chosen
(A book "Programmer's Practical Algorithm" (Andrew Binstock/john Rex), the Internet has a Chinese electronic version, but recommended to buy a genuine, this is a classic book. )
1. Overview
The sorting algorithm is the most basic algorithm in the computer technology, and many complex algorithms use the sort. Although all sorts of sorting algorithms have been enc
One, knapsack problem description:There are n items and a backpack with a weight of M, the weight of the article I is w[i], the value is p[i]. The solution of which items are loaded into the backpack allows the sum of the costs of these items to be no more than the backpack weight and the maximum value.Second, the solution:1, greedy algorithm: Greedy algorithm based on the idea is that every choice is the b
Sort Categories
sort by whether in memory
Depending on whether the records to be sorted in the sort process are all placed in memory, the sort is divided into: inner and outer sort.
For internal sorting, the performance of the sorting algorithm is mainly affected by 3 aspects:Time performance, auxiliary space, algorithmic complexity. according to the algorithm to achieve the complexity of classification S
between any two points is updated to:by knowing that, when compared to only allowing transit through the number 1th vertices, this allows the transfer through vertices 1 and 2nd, making e[1][3] and e[4][3] shorter distances. in the same vein, the shortest distance between any two points is continued in cases where only 1, 2, and 3rd vertices are allowed to be brokered. The shortest distance between any two points is updated as follows:Finally, all vertices are allowed as a transit, and the fina
Today began to study the Redis source code some of the tools in the implementation of the tool class in any language, the implementation of the algorithm principle should be the same, so you can take this opportunity to learn some of the more classical algorithms. Like I see today. CRC cyclic redundancy check algorithm and rand random number generation algorithm.
Coincidentally, almost all of the popular hash map uses the DJB hash function, commonly known as "TIMES33" algorithm.
Perl, Berkeley DB, Apache, MFC, STL, and so on.
Times33 's algorithm is also very simple, is constantly multiply by 33. Nhash = nhash*33 + *key++;
I didn't find any theory to illustrate the rationality of this algorithm, it is said that only
A * algorithm
is a heuristic search algorithm.
People who understand BFS, DFS, or Dijkstra algorithms should know that. These algorithms are a way of blindly searching around.
Heuristic Search:
Heuristic search is the search in the state space to evaluate the location of each search, get the best location, and then from this location to search until the target. This can omit a lot of fearless search path,
The dijkstra--of the halfway algorithm is understood from the angle of routing algorithm
A previous Wireless sensor network course (WSN) assigned a Dijkstra algorithm to any language in any environment. I thought, good ah, had been shouting no time to worry about the algorithm, this can be used as a breakthrough point
There are also contacts for the program paging algorithm. In general, there are two kinds of paging algorithms, one is the traditional ADO paging, the other is the select top paging algorithm. For small data tables, such as ten thousand or twenty thousand of the amount of data table, I tend to use the ADO algorithm, for large data tables, you must adopt the latte
1.3 scanning line Seed FillingAlgorithm
The two seed filling algorithms described in sections 1.1 and 1.2 have the advantage of being very simple. The disadvantage is that recursive algorithms are used, which not only requires a large amount of stack space to store adjacent points, and the efficiency is not high. In order to reduce recursive calls in algorithms and reduce stack space usage, many improved algorithms are proposed, one of which is the scanning line Seed Filling
Reference: http://blog.csdn.net/hguisu/article/details/7996185more data mining algorithms :https://github.com/linyiqun/DataMiningAlgorithmLink AnalysisIn the link analysis there are 2 classic algorithms, one is the PageRank algorithm, and the other is the hits algorithm, plainly speaking, are doing link analysis. How to do it, continue to look down.PageRank algorithmTo talk about the function of the PageRan
On the extended Euclidean algorithm (Extended Euclidean algorithm), I was working on the classic topic of frog dating to get access to this algorithm. There is also an AC code and a solution to the problem.Content: Known A, B, solves a set of X, Y, and satisfies the Bézout equation: Ax+by =gcd (A, B)Extending Euclid's algorit
Pattern matching algorithm for strings
The locating operation of a substring is often called a pattern match of a string, where T is called a pattern string .
General positioning function for substring position (Brute force)That's what I write Java code for.int Index(String s,string T,int POS) {char[] S_arr = S.tochararray (); char[] T_arr = T.tochararray ();intI,j,k;//iIs the pointer to the main string s, and J is the pointer to the pat
Chapter of
Basic Statement
This poster of algorithms are based on the book and the lecture of algorithms on Coursera which are taught by Robert Sedgewi CK and Kevin Wayne, writers of the book mentioned above.
Chapter of "algorithm" is the fundamental of Java programming language and a brief introduction to Algorithms and DA TA structure, including their concepts. Some interesting problems and the basic implementations of them. Introduction Why We s
Dijkstra algorithm
Also known as Dijkstra algorithm, is a classical shortest path algorithm, the main feature is to expand from the starting point to the outer layer, until the extension to the end point, the use of breadth-first search to solve the problem of the single source shortest path of the weighted direction graph, the
System Learning hash Algorithm (hash algorithm)
Reprint please indicate the source.
Preface:
The origin of the "system learning hash Algorithm" in this paper. After seeing the " 11, thoroughly parse hash table algorithm from beginning to end" This article, the original text does not have blizzard hash fast reason a
1. Foreword
This paper introduces the commonly used permutation and combination algorithms, including full permutation algorithm, full combination algorithm, m number selection and n combination algorithm.
2. Permutation algorithm
The common permutation algorithms are:(A) Dictionary order method(B) The increment met
Non-Blocking Algorithm
In computer science,Non-Blocking AlgorithmEnsures that threads competing for a shared resource do not have their execution indefinitely postponed by mutual exclusion. A non-blockingalgorithm isLock-freeIf there is guaranteed system-wide progress regardless of scheduling;Wait-freeIf there is also guaranteed per-thread progress.
Literature up to the turn of the 21st century used "non-blocking" synonymously with lock-free. Howeve
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.