Empirical Comparison of Techniques for Handling Missing Values
The performance of all technologies is highly depended on the quality of the data. For example, Neural Network (NN) technique can be applied very well if the data have been well prepared and free from noise and missing value. This study empirically compares several handling missing value methods fo...
| Main Author: | Tikla, Salleh Mansour Mohamed |
|---|---|
| Format: | Dissertation |
| Language: | English English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/1855/1/Salleh_Mansour_Mohamed_Tikla_-_Empirical_comparisons_of_techniques_for_handling_missing_values.pdf https://etd.uum.edu.my/1855/2/Salleh_Mansour_Mohamed_Tikla_-_Empirical_comparisons_of_techniques_for_handling_missing_values.pdf https://etd.uum.edu.my/1855/ |
| Abstract | Abstract here |
Similar Items
The Impact of Missing Value Methods and Normalization Techniques on the Performance of Data Mining Models
by: Munirah, Yahya
Published: (2011)
by: Munirah, Yahya
Published: (2011)
Empirical analysis of rough set categorical clustering techniques based on rough purity and value set
by: Uddin, Jamal
Published: (2017)
by: Uddin, Jamal
Published: (2017)
Web Based Post Flood Disaster Missing People Tracking Information System
by: Altrad, Abdallah Mahmoud. M.
Published: (2011)
by: Altrad, Abdallah Mahmoud. M.
Published: (2011)
A hybrid haptic stimulation prosthetic wearable device to recover the missing sensation of the upper limb amputees
by: Nemah, Mohammed Najeh
Published: (2019)
by: Nemah, Mohammed Najeh
Published: (2019)
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
by: Ranjeet Singh, Bishan Singh
Published: (2004)
by: Ranjeet Singh, Bishan Singh
Published: (2004)
Comparison study on sorting techniques in static data structure
by: Naser Frak, Anwar
Published: (2016)
by: Naser Frak, Anwar
Published: (2016)
Evaluating A New Adaptive Group
Lasso Imputation Technique For
Handling Missing Values In
Compositional Data
by: Tian, Ying
Published: (2024)
by: Tian, Ying
Published: (2024)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Automated platform for histological race and sex comparison of human cortical bone
by: Abdullah, Hadi
Published: (2019)
by: Abdullah, Hadi
Published: (2019)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Mining Sebha University Student Enrolment Data Using Descriptive and Predictive Approach
by: Abdoulha, Mansour Ali
Published: (2008)
by: Abdoulha, Mansour Ali
Published: (2008)
Comparison of Two Open Sources Customer Relationship Management SugarCRM & Vtiger on Usability for Community College
by: Siti Nur Thazliah, Mohd Thazali
Published: (2012)
by: Siti Nur Thazliah, Mohd Thazali
Published: (2012)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
Spatial information-based multimodal integration technique
by: Lee, Bee Wah
Published: (2006)
by: Lee, Bee Wah
Published: (2006)
The Impact of Normalization Techniques on Performance Backpropagation Networks
by: Norlida, Hassan
Published: (2004)
by: Norlida, Hassan
Published: (2004)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)
by: Ghayab, Hadi Ratham
Published: (2010)
Visualizing Student Performances Using Data Mining Techniques.
by: Sri Banu, Munisamy
Published: (2007)
by: Sri Banu, Munisamy
Published: (2007)
i-choose u: Development of Decision Support System Using Skyline Technique (Preference Query Technique): The Case of Choosing Malaysian Higher Learning Institutions
by: Elhassan, Omer Ibrahim Elkhder
Published: (2011)
by: Elhassan, Omer Ibrahim Elkhder
Published: (2011)
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
by: Mustafa, Payandenick, et al.
Published: (2025)
by: Mustafa, Payandenick, et al.
Published: (2025)
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Wood species recognition based on phase - only correlation (POC) technique
by: Nik Kamariah, Nik Ismail
Published: (2013)
by: Nik Kamariah, Nik Ismail
Published: (2013)
Binary vote assignment on grid quorum replication technique with association rule
by: Ainul Azila, Che Fauzi
Published: (2018)
by: Ainul Azila, Che Fauzi
Published: (2018)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
The performance of soft computing techniques on content-based SMS spam filtering
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
The effect of pre-processing techniques and optimal parameters on BPNN for data classification
by: HUSSEIN, AMEER SALEH
Published: (2015)
by: HUSSEIN, AMEER SALEH
Published: (2015)
Urban Planning: The Potential For Developers and Planners to Use Virtual Reality Techniques
by: Ganapreeta, Renunathan Naidu
Published: (2008)
by: Ganapreeta, Renunathan Naidu
Published: (2008)
The Application of Artificial Neural Networks Techniques to the Prediction of Ringgit Exchanges Rates
by: Fizlin, Zakaria
Published: (2004)
by: Fizlin, Zakaria
Published: (2004)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Identifying Purchasing Patterns of Arab and Malaysian
Students Using Data Mining Technique
by: Abuhamdah, Anmar Fakhri Moh'd
Published: (2006)
by: Abuhamdah, Anmar Fakhri Moh'd
Published: (2006)
Modeling Primary School Student Academic Performance Using Data Mining Technique
by: Muhamad, Mat Yaacub
Published: (2011)
by: Muhamad, Mat Yaacub
Published: (2011)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
Information Extraction From Malay Vehicle Advertisement Text Using Natural Language Processing Techniques.
by: Norfadila, Mahrom
Published: (2007)
by: Norfadila, Mahrom
Published: (2007)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
by: Yaseen, Muhammad
Published: (2021)
by: Yaseen, Muhammad
Published: (2021)
Comparative study on correctness and time taken of test case generation using EFG and BXT techniques for GUI application
by: Nser Brka, Mostafa
Published: (2015)
by: Nser Brka, Mostafa
Published: (2015)
Similar Items
-
The Impact of Missing Value Methods and Normalization Techniques on the Performance of Data Mining Models
by: Munirah, Yahya
Published: (2011) -
Empirical analysis of rough set categorical clustering techniques based on rough purity and value set
by: Uddin, Jamal
Published: (2017) -
Web Based Post Flood Disaster Missing People Tracking Information System
by: Altrad, Abdallah Mahmoud. M.
Published: (2011) -
A hybrid haptic stimulation prosthetic wearable device to recover the missing sensation of the upper limb amputees
by: Nemah, Mohammed Najeh
Published: (2019) -
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
by: Ranjeet Singh, Bishan Singh
Published: (2004)
