# Category Archives: Analysis

In mathematics, asymptotic analysis, also known as asymptotics, is a method of describing the limiting behavior of a function. In computing, asymptotic analysis of an… Read More
There are many ways of classifying algorithms and a few of them are shown below: Implementation Method Design Method Other Classifications Classification by Implementation Method:… Read More
Given two integers A and B, and also given that Alice and Bob are playing a game starting with a bag containing N balls, in… Read More
This article will discuss the different routes one could take if their code fails to work in various scenarios. If one has, seemingly at least,… Read More
Given an array arr[] of size N, the task is to calculate the maximum sum that can be obtained by dividing the array into several… Read More
Given a string, str of length N and a character X, the task is to find the maximum count of characters X that are to… Read More
Given a lower triangular matrix Mat[][], the task is to store the matrix using column-major mapping. Lower Triangular Matrix: A Lower Triangular Matrix is a… Read More
In this article, the focus is on learning some rules that can help to determine the running time of an algorithm. Asymptotic analysis refers to… Read More
In a computer, memory is composed of digital memory that stores information binary format, and the lowest unit is called a bit (binary digit). The… Read More
Instance Variable: It is basically a class variable without a static modifier and is usually shared by all class instances. Across different objects, these variables… Read More
Prerequisite: QuickSort Algorithm The quicksort algorithm discussed in this article can take O(N2) time in the worst case. Hence, certain variations are needed which can… Read More
In this article, we will discuss the time complexity of the Euclidean Algorithm which is O(log(min(a, b)) and it is achieved. Euclid’s Algorithm: It is… Read More
In this article, we will discuss various scheduling algorithms for Greedy Algorithms. Many scheduling problems can be solved using greedy algorithms. Problem statement: Given N… Read More
The Requirements Model defines a set of analysis classes. Each describes some element of the problem domain, focus on an aspect of the problem that… Read More
Sub-domain Takeover :  Sub-domain takeover is a common and most popular vulnerability. If you are not aware of such kind of vulnerability, you can understand… Read More