wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Classification Algorithms (Decision trees, SVM, Logistic regreession)

profile
37_Priyanka Bist
Sep 19, 2025
2 Likes
0 Discussions
0 Reads

What are Classification Algorithms?

Classification is a method in Data Science where we predict which category or group a data point belongs to. For example, predicting whether an email is spam or not, or whether a patient has a disease

1. Decision Trees

How it works:

  1. Works like a question-answer game.
  2. It asks questions like “Is age > 30?” and splits data into branches.
  3. The last leaf gives the final class (answer).

Use cases:

  1. Predict if a customer will leave
  2. Medical diagnosis
  3. Loan/credit risk check

Pros (good points):

  1. Very easy to understand
  2. Works with numbers and text
  3. Less data cleaning needed

Cons (bad points):

  1. Can overfit (memorize training data too much)
  2. Small changes in data can make a very different tree


2.Support Vector Machines (SVM)

How it works:

  1. Imagine you have red and blue dots on paper.
  2. SVM draws a line (boundary) to separate them with maximum distance between groups.
  3. This line is called a hyperplane.

Use cases:

  1. Image recognition
  2. Text categorization (like spam detection)
  3. Bioinformatics (like classifying proteins)

Pros (good points):

  1. Works well when there are many features
  2. Memory efficient (uses less space)

Cons (bad points):

  1. Not good for very large datasets
  2. Not good with noisy or overlapping data

3.Logistic Regression

How it works:

  1. Gives a probability between 0 and 1 using an S-shaped curve (sigmoid)
  2. If probability is > 0.5 → class A, else class B

Use cases:

  1. Spam detection
  2. Disease prediction
  3. Will a customer buy a product or not

Pros (good points):

  1. Simple, fast, and easy
  2. Easy to explain

Cons (bad points):

  1. Works best when data is linear
  2. Sensitive to outliers (unusual data points)



Comments ()


Sign in

Read Next

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Types of OS

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

OS Assignment 3 Deadlock

Blog banner

Semaphores

Blog banner

File system implementation

Blog banner

Indian Culture and Tradition

Blog banner

Life

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Heart Fulness Meditation

Blog banner

Buffers in Operating Systems

Blog banner

Layers Of Blockchain

Blog banner

Go Daddy

Blog banner

What is a Malware ?

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Precision-Recall in Data Science

Blog banner

GIS in Disaster Management

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Social Engineering Attacks

Blog banner

Operating Systems Overview

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Ola

Blog banner

Virtual memory

Blog banner

Models of Information Security.

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Critical success factors

Blog banner

Balance

Blog banner

differentiate thinking humanly and rationally

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Information Technology In E- Commerce

Blog banner

Population

Blog banner

Virtualization

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

EMAIL INVESTIGATION

Blog banner

Hubspot

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Importance Of Yoga.

Blog banner

Operating system

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Install Ubuntu Easily

Blog banner