Comparative Study of Principal Component Analysis (PCA) based on Decision Tree Algorithms

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Facial Expressions recognition Based on Principal Component Analysis (PCA)

The facial expression recognition is an ocular task that can be performed without human discomfort, is really a speedily growing on the computer research field. There are many applications and programs uses facial expression to evaluate human character, judgment, feelings, and viewpoint The process of rrecognizing facial expression is a hard task due to the several circumstances such as facial ...

متن کامل

Measuring gas demand security using Principal Component Analysis (PCA): A case study

Safeguarding the energy security is an important energy policy goal of every country. Assuring sufficient and reliable resources of energy at affordable prices is the main objective of energy security. Due to such reasons as special geopolitical position, terrorist attacks and other unrest in the Middle East, securing Iran’s energy demand and increasing her natural gas exports have turned into ...

متن کامل

Comparative Study of Principal Component Analysis and Independent Component Analysis

Face recognition is emerging as an active research area with numerous commercial and law enforcement applications. This paper presents comparative analysis of two most popular subspace projection techniques for face recognition. It compares Principal Component Analysis (PCA) and Independent Component Analysis (ICA), as implemented by the InfoMax algorithm. ORL face database is used for training...

متن کامل

Principal Component Analysis (PCA)-based Massive-MIMO Channel Feedback

Channel-state-information (CSI) feedback methods are considered, especially for massive or very large-scale multipleinput multiple-output (MIMO) systems. To extract essential information from the CSI without redundancy that arises from the highly correlated antennas, a receiver transforms (sparsifies) a correlated CSI vector to an uncorrelated sparse CSI vector by using a Karhunen-Loève transfo...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advances in Scientific Research and Engineering

سال: 2018

ISSN: 2454-8006

DOI: 10.31695/ijasre.2018.32767