Comparative Study of Principal Component Analysis (PCA) based on Decision Tree Algorithms
نویسندگان
چکیده
منابع مشابه
Facial Expressions recognition Based on Principal Component Analysis (PCA)
The facial expression recognition is an ocular task that can be performed without human discomfort, is really a speedily growing on the computer research field. There are many applications and programs uses facial expression to evaluate human character, judgment, feelings, and viewpoint The process of rrecognizing facial expression is a hard task due to the several circumstances such as facial ...
متن کاملMeasuring gas demand security using Principal Component Analysis (PCA): A case study
Safeguarding the energy security is an important energy policy goal of every country. Assuring sufficient and reliable resources of energy at affordable prices is the main objective of energy security. Due to such reasons as special geopolitical position, terrorist attacks and other unrest in the Middle East, securing Iran’s energy demand and increasing her natural gas exports have turned into ...
متن کاملComparative Study of Principal Component Analysis and Independent Component Analysis
Face recognition is emerging as an active research area with numerous commercial and law enforcement applications. This paper presents comparative analysis of two most popular subspace projection techniques for face recognition. It compares Principal Component Analysis (PCA) and Independent Component Analysis (ICA), as implemented by the InfoMax algorithm. ORL face database is used for training...
متن کاملPrincipal Component Analysis (PCA)-based Massive-MIMO Channel Feedback
Channel-state-information (CSI) feedback methods are considered, especially for massive or very large-scale multipleinput multiple-output (MIMO) systems. To extract essential information from the CSI without redundancy that arises from the highly correlated antennas, a receiver transforms (sparsifies) a correlated CSI vector to an uncorrelated sparse CSI vector by using a Karhunen-Loève transfo...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advances in Scientific Research and Engineering
سال: 2018
ISSN: 2454-8006
DOI: 10.31695/ijasre.2018.32767