wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Classification Algorithms (Decision trees, SVM, Logistic regreession)

profile
37_Priyanka Bist
Sep 19, 2025
2 Likes
0 Discussions
0 Reads

What are Classification Algorithms?

Classification is a method in Data Science where we predict which category or group a data point belongs to. For example, predicting whether an email is spam or not, or whether a patient has a disease

1. Decision Trees

How it works:

  1. Works like a question-answer game.
  2. It asks questions like “Is age > 30?” and splits data into branches.
  3. The last leaf gives the final class (answer).

Use cases:

  1. Predict if a customer will leave
  2. Medical diagnosis
  3. Loan/credit risk check

Pros (good points):

  1. Very easy to understand
  2. Works with numbers and text
  3. Less data cleaning needed

Cons (bad points):

  1. Can overfit (memorize training data too much)
  2. Small changes in data can make a very different tree


2.Support Vector Machines (SVM)

How it works:

  1. Imagine you have red and blue dots on paper.
  2. SVM draws a line (boundary) to separate them with maximum distance between groups.
  3. This line is called a hyperplane.

Use cases:

  1. Image recognition
  2. Text categorization (like spam detection)
  3. Bioinformatics (like classifying proteins)

Pros (good points):

  1. Works well when there are many features
  2. Memory efficient (uses less space)

Cons (bad points):

  1. Not good for very large datasets
  2. Not good with noisy or overlapping data

3.Logistic Regression

How it works:

  1. Gives a probability between 0 and 1 using an S-shaped curve (sigmoid)
  2. If probability is > 0.5 → class A, else class B

Use cases:

  1. Spam detection
  2. Disease prediction
  3. Will a customer buy a product or not

Pros (good points):

  1. Simple, fast, and easy
  2. Easy to explain

Cons (bad points):

  1. Works best when data is linear
  2. Sensitive to outliers (unusual data points)



Comments ()


Sign in

Read Next

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

"Audit" In Data Science

Blog banner

Power of words

Blog banner

RAID

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

MySQL

Blog banner

Google classroom

Blog banner

Os(Computer security threats)

Blog banner

Why is ITSM important in IT organization?

Blog banner

virtual machine

Blog banner

Install Ubuntu in Vmware

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

SPEM

Blog banner

FILE SHARING

Blog banner

Concurrency and memory

Blog banner

Security issues

Blog banner

Importance of Education

Blog banner

Computer Security

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Race Conditions

Blog banner

Deadlock in operating system

Blog banner

OS Evolution Achievements

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Operating Systems Overview

Blog banner

Network Security Risks

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Service transition principles

Blog banner

CyberSecurity Color Wheel

Blog banner

note taker app

Blog banner

IT service level agreement

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

The Five Steps of Data Science

Blog banner

MACHINE LEARNING

Blog banner

Artical on FreshBooks

Blog banner

Operating System

Blog banner