wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Classification Algorithms (Decision trees, SVM, Logistic regreession)

profile
37_Priyanka Bist
Sep 19, 2025
2 Likes
0 Discussions
0 Reads

What are Classification Algorithms?

Classification is a method in Data Science where we predict which category or group a data point belongs to. For example, predicting whether an email is spam or not, or whether a patient has a disease

1. Decision Trees

How it works:

  1. Works like a question-answer game.
  2. It asks questions like “Is age > 30?” and splits data into branches.
  3. The last leaf gives the final class (answer).

Use cases:

  1. Predict if a customer will leave
  2. Medical diagnosis
  3. Loan/credit risk check

Pros (good points):

  1. Very easy to understand
  2. Works with numbers and text
  3. Less data cleaning needed

Cons (bad points):

  1. Can overfit (memorize training data too much)
  2. Small changes in data can make a very different tree


2.Support Vector Machines (SVM)

How it works:

  1. Imagine you have red and blue dots on paper.
  2. SVM draws a line (boundary) to separate them with maximum distance between groups.
  3. This line is called a hyperplane.

Use cases:

  1. Image recognition
  2. Text categorization (like spam detection)
  3. Bioinformatics (like classifying proteins)

Pros (good points):

  1. Works well when there are many features
  2. Memory efficient (uses less space)

Cons (bad points):

  1. Not good for very large datasets
  2. Not good with noisy or overlapping data

3.Logistic Regression

How it works:

  1. Gives a probability between 0 and 1 using an S-shaped curve (sigmoid)
  2. If probability is > 0.5 → class A, else class B

Use cases:

  1. Spam detection
  2. Disease prediction
  3. Will a customer buy a product or not

Pros (good points):

  1. Simple, fast, and easy
  2. Easy to explain

Cons (bad points):

  1. Works best when data is linear
  2. Sensitive to outliers (unusual data points)



Comments ()


Sign in

Read Next

Explaining Buffer Overflow with Example

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

ZOHO

Blog banner

Health and fitness

Blog banner

Importance of internet

Blog banner

Article on Fresh Book

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Be you

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Memory management

Blog banner

Ola

Blog banner

memory managment

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Loneliness

Blog banner

E-Governance

Blog banner

Hacking of web server and application

Blog banner

Big Data

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

File management -disha parekh

Blog banner

MODERN OPERATING SYSTEM

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Pandas Matrix Applications

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Types of Hackers

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

SQL Injection practice on DVWA

Blog banner

Consumer to consumer business mode

Blog banner

Importance of modern technology era

Blog banner

Social Engineering

Blog banner

Paralysis/Paralysis Stroke

Blog banner

EFT

Blog banner

NodeJs

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Threads

Blog banner

Service design process in ITSM

Blog banner

Vikrant’s first blog

Blog banner

OS ASSIGNMENT

Blog banner

Platonic Solids

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Self defence

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Privacy LAWs in IT

Blog banner