Machine Learning Research

Volume 2, Issue 1, March 2017

  • Investigation of the IOT Network of Packet Loss’s Long-Range Dependence and QOE

    Yibin Hou, Jin Wang

    Issue: Volume 2, Issue 1, March 2017
    Pages: 1-9
    Received: Jan. 04, 2017
    Accepted: Jan. 21, 2017
    Published: Feb. 20, 2017
    DOI: 10.11648/j.mlr.20170201.11
    Downloads:
    Views:
    Abstract: The Internet of things, including Internet technology, including wired and wireless networks. Internet of Things and the Internet is the relationship between the parent and the child. In this paper, we aim to study the Investigation on the network packet loss’s long-range dependence and QOE and gain a good result and conclusion. In order to better ... Show More
  • An Overview of Big Data Applications in Water Resources Engineering

    Sirisha Adamala

    Issue: Volume 2, Issue 1, March 2017
    Pages: 10-18
    Received: Jan. 23, 2017
    Accepted: Feb. 07, 2017
    Published: Mar. 01, 2017
    DOI: 10.11648/j.mlr.20170201.12
    Downloads:
    Views:
    Abstract: One of the emerging challenges in the 21th century era is collecting and handling ‘Big Data’. The definition of big data changes from one area to other over time. Big data as its name implies is unstructured data that is very big, fast, hard and comes in many forms. Though the applications of big data was confined to information technology before 2... Show More
  • Recursive Algorithms of Closed Loop Identification with a Tailor Made Parameterization

    Wang Jian-hong

    Issue: Volume 2, Issue 1, March 2017
    Pages: 19-25
    Received: Jan. 10, 2017
    Accepted: Feb. 14, 2017
    Published: Mar. 02, 2017
    DOI: 10.11648/j.mlr.20170201.13
    Downloads:
    Views:
    Abstract: In this paper, we propose two recursive algorithms for closed loop identification under the framework of a tailor made parameterization. The closed loop transfer function is parameterized using the parameters of the open loop plant model, and utilizing knowledge of the feedback controller. When the plant model and feedback controller are all polyno... Show More
  • A Decision Tree Algorithm Based System for Predicting Crime in the University

    Adewale Opeoluwa Ogunde, Gabriel Opeyemi Ogunleye, Oluwaleke Oreoluwa

    Issue: Volume 2, Issue 1, March 2017
    Pages: 26-34
    Received: Jan. 27, 2017
    Accepted: Feb. 13, 2017
    Published: Mar. 02, 2017
    DOI: 10.11648/j.mlr.20170201.14
    Downloads:
    Views:
    Abstract: CRIME is one of the major problems encountered in any society and universities together with other higher institutions of learning are not exceptions. Thus, there is an urgent need for security agents and agencies to battle and eradicate crime. The Directorate of Students and Services Development (DSSD) are responsible for investigating and detecti... Show More
  • Pattern Recognition Versus Verification Systems Analysis Studies for Biometrics Face Based Independent Component Analysis

    Soltane Mohamed

    Issue: Volume 2, Issue 1, March 2017
    Pages: 35-50
    Received: Jan. 12, 2017
    Accepted: Feb. 16, 2017
    Published: Mar. 03, 2017
    DOI: 10.11648/j.mlr.20170201.15
    Downloads:
    Views:
    Abstract: Face recognition has long been a goal of computer vision, but only in recent years reliable automated face recognition has become a realistic target of biometrics research. In this paper the contribution of classifier analysis to the Face Biometrics Verification performance is examined. It refers to the paradigm that in classification tasks, the us... Show More