EFFECTIVENESS OF PCA IN CLASSIFICATION PROBLEMS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 1
Abstract
This paper is designed to make the study of effectiveness of PCA (Principal Component Analysis) method effectiveness in classification specially for the classification of face and computer virus. This technique is generally used for problems where eigenvector analysis is required. In order to analyze the varying trend in computer virology, the study of algorithms from different flavour and from various domains is required to make the vision clear towards viral detection.
Authors and Affiliations
ankur bist
MODELING OF TRACTOR SEAT WITH REDUCED RISK OF WHOLE BODY VIBRATION
Exposure to vibration is the cause of some occupational injuries and diseases. The objective of this study was determination of transmission of vibration which transmitted to tractor drivers from the seat operator...
Network Pruning-Detecting Duplicate Efficiently in XML Data
Duplicate detection is a non-trivial task in which duplicates are not exactly equal due to error in the data and objects. The existing system uses a method called XMLDup. It considers only the XML data files to de...
IDENTIFYING CIRCULATING TUMOR CELLS IN BREAST CANCER WITH DATA MINING ALGORITHMS BY USING MICROARRAY
Breast Cancer (BC) is an extremely diverse disease and extremely widespread among western women. Circulating tumor cells (CTCs) in Peripheral Blood (PB) is one of the most significant diagnostic factors for the cau...
EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK
This paper aims to intend efficient data forwarding technique based on social similarity in case of mobile social networks (MSNs). Mobile Social Network (MSN) with miscellaneous connectivity characteristics is a grou...
STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS
To minimize a security gap in the networks which a single compromised or malicious device can expose an entire mobile network because of the open nature of these networks. The attacker can launch a variety of active...