The Beard Sage

  • Machine Learning
  • Computer Architecture
  • Theoretical Computer Science
  • About Me

Hidden Markov Models Likelihood Computation – The Forward Algorithm

posted in Machine Learning on February 12, 2020 by TheBeard 0 Comments

This article computes the probability of an observation being output by a given Hidden Markov Model. The brute force method is discussed, followed by a dynamic programming optimization. Derivations and diagrams are sketched out and time complexity is analyzed.

Continue reading →

Cache Organization and Address Mapping

posted in Computer Architecture on February 11, 2020 by TheBeard 0 Comments

A clear understanding of various Cache organization concepts and the math behind it. Different address mapping schemes are discussed with descriptive images and detailed examples.

Continue reading →

Converting a Regular Expression to an equivalent NFA

posted in Theoretical Computer Science on February 10, 2020 by TheBeard 0 Comments

A step-by-step approach to convert a regular expression to an equivalent NFA. Basic 6 cases are explained followed by a complex expression example.

Continue reading →

d-Separation through examples

posted in Machine Learning on February 9, 2020 by TheBeard 0 Comments

This article presents a procedure to check whether two nodes in a Bayesian Network are conditionally independent from each other using the idea of active triples within the path connecting the nodes.

Continue reading →

Visualizing Hidden Markov Models

posted in Machine Learning on February 8, 2020 by TheBeard 2 Comments

In this article, the notations behind expressing an Hidden Markov Model are explored through formal definitions, state diagrams and examples.

Continue reading →

Constructing the Cross-Product of 2 DFAs

posted in Theoretical Computer Science on February 7, 2020 by TheBeard 0 Comments

A step-by-step visual approach to construct the Cross-Product of two DFAs to create the union and intersection of two languages.

Continue reading →

Write and No-Write Allocate

posted in Computer Architecture on February 6, 2020 by TheBeard 0 Comments

An intuitive explanation of Write Allocate. All combinations of Write Back and Write Through schemes with Write and No-Write Allocate are discussed.

Continue reading →

Cache Optimization – Critical Word First and Early Restart

posted in Computer Architecture on February 5, 2020 by TheBeard 1 Comment

This article discusses an advanced cache optimization to reduce miss penalty by allowing the processor to resume execution as soon as the requested word within a cache block is available.

Continue reading →

Ternary representation of an integer that is a multiple of 5

posted in Theoretical Computer Science on February 4, 2020 by TheBeard 0 Comments

A step-by-step intuitive explanation for building a DFA to accept ternary numbers that are multiples of 5. A general formula is derived and using that, the transition table of the DFA is computed.

Continue reading →

Pseudo-LRU Tree Implementation

posted in Computer Architecture on February 3, 2020 by TheBeard 0 Comments

A 4-block cache is visualized as the nodes of a tree to approximate LRU. The different configurations are discussed in detail to point out the recency of blocks and how the configuration changes upon cache reference.

Continue reading →
← Older posts
Newer posts →
Copyright (C) 2021. All rights reserved.