An assessment framework of SIAM/ARAI fuel efficiency using semi-supervised and similarity methods

In this paper, we are going to use the Pearson and Spearman methodologies for the real-time application of finding the fuel efficiency in 4 wheelers. The Pearson and Spearman methodologies are the correlation methodologies used mainly in the Software development process to identify the complexity between the various modules of the software. Identifying the complexity is important because if the complexity is higher then there is a higher chance of occurrence of the risk in the software. Hence we choose the Pearson and Spearman methods to analyze the fuel consumption of 4 wheelers between the City and Highway.

[1]  Yi Wang,et al.  An improved ridge features extraction algorithm for distorted fingerprints matching , 2013, J. Inf. Secur. Appl..

[2]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[3]  Yang Wang,et al.  Dissecting pattern unlock: The effect of pattern strength meter on pattern selection , 2014, J. Inf. Secur. Appl..

[4]  M. Koch,et al.  Prognostic impact of a compartment-specific angiogenic marker profile in patients with pancreatic cancer , 2014, OncoTarget.

[5]  Chandra Segar Thirumalai,et al.  SYSTEM USING BASE 128 ENCODING SCHEME , 2017 .

[6]  Chandrasegar Thirumalai,et al.  An assessment framework of intuitionistic fuzzy network for C2B decision making , 2017, 2017 4th International Conference on Electronics and Communication Systems (ICECS).

[7]  Paolo Nesi,et al.  A method and tool for assessing object-oriented projects and metrics management , 2000, J. Syst. Softw..

[8]  F. Galton Kinship and Correlation , 1989 .

[9]  P. Viswanathan,et al.  Fingerprint enhancement and compression method using Morlet wavelet , 2010 .

[10]  R. Kanimozhi,et al.  Data analysis using box plot on electricity consumption , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[11]  D. Griffith Spatial Autocorrelation and Spatial Filtering , 2003 .

[12]  F. Galton I. Co-relations and their measurement, chiefly from anthropometric data , 1889, Proceedings of the Royal Society of London.

[13]  Paul A. Watters,et al.  A methodology for estimating the tangible cost of data breaches , 2014, J. Inf. Secur. Appl..

[14]  J. Piovani The historical construction of correlation as a conceptual and operative instrument for empirical research , 2008 .

[15]  A. Vijayalakshmi,et al.  Heuristics prediction of olympic medals using machine learning , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[16]  Chandrasegar Thirumalai,et al.  An assessment framework for Precipitation decision making using AHP , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[17]  P. Venkata Krishna,et al.  Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[18]  Chandra Segar Thirumalai REVIEW ON THE MEMORY EFFICIENT RSA VARIANTS , 2017 .

[19]  Chandrasegar Thirumalai,et al.  Analyzing the forest fire using correlation methods , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[20]  R. Fisher 014: On the "Probable Error" of a Coefficient of Correlation Deduced from a Small Sample. , 1921 .

[21]  Chandra Segar Thirumalai,et al.  ON NON-LINEAR SET ASSOCIATIVE CACHE DESIGN , 2017 .

[22]  Chandra Segar Thirumalai PHYSICIANS DRUG ENCODING SYSTEM USING AN EFFICIENT AND SECURED LINEAR PUBLIC KEY CRYPTOSYSTEM (ESLPKC) , 2016 .

[23]  N Chandramowliswaran,et al.  A Note on Linear based Set Associative Cache address System , 2012 .

[24]  P. Venkata Krishna,et al.  A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology , 2014, IEEE Journal of Biomedical and Health Informatics.

[25]  Chandrasegar Thirumalai,et al.  An assessment of halstead and COCOMO model for effort estimation , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[26]  C. Spearman General intelligence Objectively Determined and Measured , 1904 .

[27]  Chandrasegar Thirumalai,et al.  Physicians medicament using linear public key crypto system , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[28]  Daniele Sgandurra,et al.  Automating the assessment of ICT risk , 2014, J. Inf. Secur. Appl..

[29]  G. Yule On the significance of Bravais' formulæ for regression, &c., in the case of skew correlation , 2022, Proceedings of the Royal Society of London.

[30]  Chandra Segar Thirumalai,et al.  SPANNING TREE APPROACH FOR ERROR DETECTION AND CORRECTION , 2017 .

[31]  Chandrasegar Thirumalai,et al.  Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[33]  Jan Hauke,et al.  Comparison of Values of Pearson's and Spearman's Correlation Coefficients on the Same Sets of Data , 2011 .

[34]  Chandrasegar Thirumalai,et al.  Data analysis using box and whisker plot for lung cancer , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[35]  P. Venkata Krishna,et al.  Fusion of Cryptographic Watermarking Medical Image System with Reversible Property , 2011 .

[36]  Chandrasegar Thirumalai,et al.  Investigating the breast cancer tissue utilizing semi-supervised learning and similarity measure , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[37]  Chandrasegar Thirumalai,et al.  Analysing the concrete compressive strength using Pearson and Spearman , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[38]  Typical Laws of Heredity , 1877, Nature.

[39]  Chandrasegar Thirumalai,et al.  Evaluating software metrics of gaming applications using code counter tool for C and C++ (CCCC) , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[40]  Chandrasegar Thirumalai,et al.  Multi key distribution scheme by diophantine form for secure IoT communications , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[41]  Salil S. Kanhere,et al.  Trust-based privacy-aware participant selection in social participatory sensing , 2015, J. Inf. Secur. Appl..

[42]  Adam J. Aviv,et al.  Cross-domain collaboration for improved IDS rule set selection , 2015, J. Inf. Secur. Appl..

[43]  Chandrasegar Thirumalai,et al.  Analysis of cost estimation function for facebook web click data , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[44]  R. Vijayaragavan,et al.  Pell's RSA key generation and its security analysis , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[45]  Chandrasegar Thirumalai,et al.  One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction Approach , 2018 .

[46]  Chandrasegar Thirumalai,et al.  Decision making system using machine learning and Pearson for heart attack , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[47]  Benjamin J. Raphael,et al.  Multiplatform Analysis of 12 Cancer Types Reveals Molecular Classification within and across Tissues of Origin , 2014, Cell.