{"title":"Evaluation of Cardiovascular Disease Prediction Using Decision making trial and Evaluation Laboratory Method","authors":"","doi":"10.46632/jemm/5/4/9","DOIUrl":"https://doi.org/10.46632/jemm/5/4/9","url":null,"abstract":"Predict a patient with heart disease Classify like Logistic Regression and KNN Different algorithms of machine learning We used How to improve the accuracy of this model Very useful for controlling what can be used approach was used predicting myocardial infarction in any given individual. The most important behavior for heart disease and stroke Risk factors include unhealthy diet, physical inactivity Temperament, tobacco use and alcohol harm result in Effects of behavioral risk factors are high Blood pressure, increased blood glucose, increased blood In fat and overweight and obesity manifested in persons. Alternative: Abnormal TG, Abnormal TC, Abnormal LDL, Abnormal HDL And extraordinary FPG. Evaluation Preference: Abnormal TG, Abnormal TC, Abnormal LDL, Abnormal HDL And extraordinary FPG. From the result it is seen that Abnormal HDL and is got the first rank whereas is the Abnormal TG got is having the lowest rank. The value of the dataset for Range of Cardiovascular Disease Prediction in DEMATEL Method shows that it results in Abnormal HDL and top ranking.","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge and skill development In accounting education using the SPSS method","authors":"","doi":"10.46632/jemm/5/4/18","DOIUrl":"https://doi.org/10.46632/jemm/5/4/18","url":null,"abstract":"","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Hill-climbing using Evaluation Based on Distance from Average Solution (EDAS) Method","authors":"","doi":"10.46632/jemm/5/4/13","DOIUrl":"https://doi.org/10.46632/jemm/5/4/13","url":null,"abstract":"Hill climbing, also known as Mountain climbing, speed climbing or speed climbing Mountain climbing is a branch motorsport in which drivers race against the clock to complete an uphill course. In numerical analysis, hill climbing is a local search A family of mathematical optimization techniques. it is a One that begins with an arbitrary solution to the problem is the process. Alternative: Probability of crossover, Probability of mutation, Maximum iterations, and Population size. Evaluation Preference: SA, GA, MA, ME-BPSO, WAO-CM, LHCMA. From the result it is seen that WAO-CM and is got the first rank whereas is the GA got is having the lowest rank. The value of the dataset for Hill climbing in EDAS method shows that it results in WAO-CM and top ranking.","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of Data Prediction using WSM Method","authors":"","doi":"10.46632/jemm/5/4/10","DOIUrl":"https://doi.org/10.46632/jemm/5/4/10","url":null,"abstract":"Existing Traffic Flow Forecasting Methods Mainly predicts shallow traffic Use models, and many are real still not satisfactory for worldly applications. This situation prompts a rethinking of Traffic flow is massive deep architectural models basically a prediction problem Traffic data. In this paper, useful missing data for ensemble filtering We propose an estimation algorithm. A Other similar users (items) to user (item) If so, our approach accounts for missing data Predicting and informing users, products or How to recover missing data using both Determines what to predict. Alternative: TUNNEL, SOIL, INDOOR, WATER and RANDOM FOREST. Evaluation option: MAE, SD of MAE, MAPE, MAPE of SD from the result it is seen that RANDOM FOREST and is got the first rank whereas is the WATER got is having the lowest rank. The value of the dataset for Range of Data Prediction in WSM (Weighted sum model) Method shows that it results in RANDOM FOREST and top ranking.","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"36 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Memetic algorithm Using VIKOR Method","authors":"","doi":"10.46632/jemm/5/4/16","DOIUrl":"https://doi.org/10.46632/jemm/5/4/16","url":null,"abstract":"A memetic algorithm is a variant of the traditional genetic algorithm is expansion. This is a local search technique Uses, which are pre-merged Reduces chance. A simplified data Cryptographic analysis of an encryption standard is NP-hard Can be formulated as a joint problem. Memetic algorithms (MAs) are global search Evolution uses local search rather than algorithms are the means. MAs are evolutionary mechanisms are, they are local search to refine individuals using processes. Dolphins, Elegans, Hamsterster, Ca-Grqc. The size of population, the number of generations, Size of the mating pool, Tournament size, the probability of crossover, the probability of mutation. From the end based on the number of generations are the result seen and got the first Rank, whereas the probability of mutation got having the lowest rank. The Value of dataset for Memetic Algorithm in VIKOR method shows that it results in the number of generations and top ranking.","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Based Service Access framework for Pervasive application: Comparative Analysis of AHP and Fuzzy AHP","authors":"","doi":"10.46632/jemm/5/4/1","DOIUrl":"https://doi.org/10.46632/jemm/5/4/1","url":null,"abstract":"","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a ELECTRE MCDM method for Software Testing Techniques","authors":"","doi":"10.46632/jemm/5/4/6","DOIUrl":"https://doi.org/10.46632/jemm/5/4/6","url":null,"abstract":"","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129125562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of drilling parameters on Ramie-jute fibres Reinforced hybrid epoxy composite using Taguchi method","authors":"","doi":"10.46632/jemm/5/3/2","DOIUrl":"https://doi.org/10.46632/jemm/5/3/2","url":null,"abstract":"","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach towards Design and Implementation of Cryptographic Hash Techniques for Message Authentication","authors":"","doi":"10.46632/jemm/5/3/1","DOIUrl":"https://doi.org/10.46632/jemm/5/3/1","url":null,"abstract":"","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"36 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on planting sustainable design for reversing of Environmental issues & Challenges","authors":"","doi":"10.46632/jemm/5/3/3","DOIUrl":"https://doi.org/10.46632/jemm/5/3/3","url":null,"abstract":"","PeriodicalId":174846,"journal":{"name":"REST Journal on Emerging trends in Modelling and Manufacturing","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}