CPU Scheduling
/ˌsiː-piː-ˈjuː ˈskɛd.jʊ.lɪŋ/
noun — “deciding which process gets the CPU’s attention next without starting a fistfight.”
CPU Scheduling is the mechanism by which an operating system decides the order in which ready-to-run processes get to use the CPU. In multitasking environments, multiple processes often compete for CPU time, and CPU Scheduling determines who runs when and for how long. Its primary goals are fairness, responsiveness, and optimal utilization of the processor.
Anomaly Detection
/əˈnɑːməli dɪˈtɛkʃən/
noun — "finding the needle in the data haystack before it ruins your day."
Anomaly Detection is a field in information technology and data science focused on identifying unusual patterns, outliers, or unexpected behaviors in datasets, systems, or network traffic. These anomalies may indicate errors, security breaches, fraud, system malfunctions, or rare but important events. Detecting anomalies helps organizations respond proactively to irregularities that could affect performance, security, or decision-making.
Approximate String Matching
/əˈprɑksɪmət strɪŋ ˈmætʃɪŋ/
noun — "finding near matches between strings."
Damerau-Levenshtein
/ˌdæməˌraʊ ˌlɛvə(n)ˈʃtaɪn/
noun — "an enhanced string difference metric allowing transpositions."
Levenshtein Distance
/ˌlɛvə(n)ˈʃtaɪn ˈdɪstəns/
noun — "a metric for measuring string differences."
Scheduling Algorithms
/ˈskɛdʒʊlɪŋ ˈælɡərɪðəmz/
noun — "methods to determine which task runs when."
Turbo Codes
/ˈtɜːrboʊ koʊdz/
noun … “Iterative error-correcting codes approaching channel capacity.”
Low-Density Parity-Check
/ˌɛl diː piː siː/
noun … “Sparse code for near-Shannon-limit error correction.”
Cipher-based Message Authentication Code
/siː-mæk/
noun — "the cryptographic signature that proves a message hasn’t been tampered with."
CMAC, short for Cipher-based Message Authentication Code, is a cryptographic algorithm used to verify the integrity and authenticity of messages. It generates a fixed-size tag from a variable-length message using a block cipher, such as AES, ensuring that any alteration in the message can be detected.
Hash function
/hæʃ ˈfʌŋk.ʃən/
noun — "a function that converts data into a fixed-size digital fingerprint."
Hash Function is a mathematical algorithm that transforms input data of arbitrary length into a fixed-size value, called a hash or digest. This process is deterministic, meaning the same input always produces the same hash, but even a tiny change in input drastically changes the output. Hash Functions are widely used in data integrity verification, cryptography, digital signatures, password storage, and blockchain technologies.