2022
DOI: 10.32604/cmc.2022.027364
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Analysis of Methods Used to Solve Linear Regression Models

Abstract: Predicting the value of one or more variables using the values of other variables is a very important process in the various engineering experiments that include large data that are difficult to obtain using different measurement processes. Regression is one of the most important types of supervised machine learning, in which labeled data is used to build a prediction model, regression can be classified into three different categories: linear, polynomial, and logistic. In this research paper, different methods… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 23 publications
0
15
0
Order By: Relevance
“…The stego image must has a good quality [38][39][40][41][42][43][44][45][46][47][48], it must be closed to the covering image, the quality of the stego image can be measures visually or/and by calculating MSE, PSN, CC, and NSCR between the covering and the stego images.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…The stego image must has a good quality [38][39][40][41][42][43][44][45][46][47][48], it must be closed to the covering image, the quality of the stego image can be measures visually or/and by calculating MSE, PSN, CC, and NSCR between the covering and the stego images.…”
Section: Implementation and Experimental Resultsmentioning
confidence: 99%
“…Many methods [55][56][57][58][59][60][61][62] were introduced for data cryptography, many o them were based on data encryption standard (DES), mostly these methods share the following characteristics (some of the characteristics are considered as a disadvantages which need solving (see table 2)) [1][2][3][4][5][6][7][8][9][10][11]:…”
Section: Related Workmentioning
confidence: 99%
“…In computing, unencrypted data is also known as common text, and encrypted data is called cipher text. The formulas used to encrypt and decrypt messages are called cipher algorithms or ciphers [55][56][57][58][59][60][61][62]. To be effective, encryption includes a variable as part of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations