wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Big O Notation

profile
Ronak Gala
Feb 16, 2023
2 Likes
2 Discussions
167 Reads

 Big-O Analysis of Algorithms

We can express algorithmic complexity using the big-O notation. For a problem of size N:

  • A constant-time function/method is “order 1” : O(1)
  • A linear-time function/method is “order N” : O(N)
  • A quadratic-time function/method is “order N squared” : O(N2 )

Definition: Let g and f be functions from the set of natural numbers to itself. The function f is said to be O(g) (read big-oh of g), if there is a constant c > 0 and a natural number n0 such that f(n) ≤ cg(n) for all n ≥ n0 .

Note: O(g) is a set!

 

 

Runtime Analysis of Algorithms

In general cases, we mainly used to measure and compare the worst-case theoretical running time complexities of algorithms for the performance analysis. 
The fastest possible running time for any algorithm is O(1), commonly referred to as Constant Running Time. In this case, the algorithm always takes the same amount of time to execute, regardless of the input size. This is the ideal runtime for an algorithm, but it’s rarely achievable. 
In actual cases, the performance (Runtime) of an algorithm depends on n, that is the size of the input or the number of operations is required for each input item. 


Comments ()


Sign in

Read Next

INSTAGRAM

Blog banner

Disk scheduling

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Virtual Memory

Blog banner

GIS Topography

Blog banner

Threads and concurrency

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Computer Security

Blog banner

Memory Management

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

De-Coding Love

Blog banner

Service Catalogue Management

Blog banner

Fault tolerance

Blog banner

Types of Threads

Blog banner

File management

Blog banner

Whatsapp Messenger

Blog banner

Modern operating system

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

What is Email? Uses of Emails

Blog banner

A Short History of GIS

Blog banner

Characteristics of Etherum

Blog banner

Service Design Model

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Buffers in Operating Systems

Blog banner

Brain wash of social media

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Memory Management - operating system

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Smitten Kitchen Keepers

Blog banner

Satellite Based Positioning

Blog banner

Malicious softwares

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Phishing

Blog banner

Shoulders

Blog banner

Data Lake

Blog banner

Cyber Security in Data Breaching

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

TRAIN TRAVELING

Blog banner

PODIO

Blog banner

How Men and Women Process Pain Differently

Blog banner

Deadlock and Starvation

Blog banner