wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Classification Algorithms (Decision trees, SVM, Logistic regreession)

profile
37_Priyanka Bist
Sep 19, 2025
2 Likes
0 Discussions
0 Reads

What are Classification Algorithms?

Classification is a method in Data Science where we predict which category or group a data point belongs to. For example, predicting whether an email is spam or not, or whether a patient has a disease

1. Decision Trees

How it works:

  1. Works like a question-answer game.
  2. It asks questions like “Is age > 30?” and splits data into branches.
  3. The last leaf gives the final class (answer).

Use cases:

  1. Predict if a customer will leave
  2. Medical diagnosis
  3. Loan/credit risk check

Pros (good points):

  1. Very easy to understand
  2. Works with numbers and text
  3. Less data cleaning needed

Cons (bad points):

  1. Can overfit (memorize training data too much)
  2. Small changes in data can make a very different tree


2.Support Vector Machines (SVM)

How it works:

  1. Imagine you have red and blue dots on paper.
  2. SVM draws a line (boundary) to separate them with maximum distance between groups.
  3. This line is called a hyperplane.

Use cases:

  1. Image recognition
  2. Text categorization (like spam detection)
  3. Bioinformatics (like classifying proteins)

Pros (good points):

  1. Works well when there are many features
  2. Memory efficient (uses less space)

Cons (bad points):

  1. Not good for very large datasets
  2. Not good with noisy or overlapping data

3.Logistic Regression

How it works:

  1. Gives a probability between 0 and 1 using an S-shaped curve (sigmoid)
  2. If probability is > 0.5 → class A, else class B

Use cases:

  1. Spam detection
  2. Disease prediction
  3. Will a customer buy a product or not

Pros (good points):

  1. Simple, fast, and easy
  2. Easy to explain

Cons (bad points):

  1. Works best when data is linear
  2. Sensitive to outliers (unusual data points)



Comments ()


Sign in

Read Next

Penetration Testing

Blog banner

OS Assignment 3

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

What is Virtual Memory

Blog banner

Elegant fashion style

Blog banner

Pink sauce pasta

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Balance

Blog banner

TRIGGERS IN DATABASE

Blog banner

CONCURRENCY

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Online Games

Blog banner

INTRODUCTION TO C#

Blog banner

PHISHING

Blog banner

MODERN OPERATING SYSTEM

Blog banner

History of ITIL

Blog banner

1.1 basic elements

Blog banner

Malware

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

File management

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

15 Interesting Facts about India

Blog banner

Interrupts in operating system.

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

File System

Blog banner

Process states

Blog banner

Understanding Mobile Device Forensics

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

VPN

Blog banner

Instagram

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Virtual memory in os

Blog banner

Understanding - Proof of Work!

Blog banner

Music is life

Blog banner

Cache memory

Blog banner

Deadlock and starvation in operating system

Blog banner

Data Lake

Blog banner

Steganography and Steganalysis

Blog banner