Open Access Open Access  Restricted Access Subscription Access

Structure Equation Modelling for Machine Learning Techniques Adopted for Prediction in IT SMEs

Prashanth Kumar C P, Nishanth Selvam P, Lavanya A, Ashalatha HS, Nagaveni R, Dr Jayalakshmi, Dr Geetha N

Abstract


Machine Learning approaches are useful and have all around attempted to be useful in goal issues and specialized issues that need information. As a rule, the bundle space issues might be described as a technique for learning that relies upon the varying conditions and changes of the specialized issue being tended to with regards to the standards of machine learning, a prophetic model is made by misuse machine learning approaches and grouped into imperfect and non-blemished modules. Machine learning methods encourage engineers to recover accommodating information when the arrangement of sorts of specialized issues being tended to in an extremely explicit field. This progressively allows them to break down information from entirely unexpected perspectives, which might be utilized due to the development base of productive ideas and differed strategies to deal with the specialized issues. In this research article we have tried to understand the relationships between various variables which are important for IT SME’s, the study is carried out with the help of a well-structured questionnaire using IBM SPSS tool for data analysis and interpretation. We have made use of Structure equation modeling approach for identification of important factors.


Full Text:

PDF

References


Shan, C., Chen, B., Hu, C., Xue, J., & Li, N. (2014). Software defect prediction model based on LLE and SVM.

Moyo, S., & Mnkandla, E. (2020). A Novel Lightweight Solo Software Development Methodology With Optimum Security Practices. IEEE Access, 8, 33735-33747.

Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Mathov, Y., Bhairav, S., ... & Elovici, Y. (2019). Security testbed for internet-of-things devices. IEEE Transactions on Reliability, 68(1), 23-44.

Zhao, X., Xue, J., Hu, C., Ma, R., & Zhang, S. (2014). Research on software behavior modeling based on extended finite state automata.

Dong, H., Li, C., Li, T., Du, Y., & Xu, G. (2014). Research on the security model of mobile application.

Márquez, G., Astudillo, H., & Taramasco, C. (2020). Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study. IEEE Access, 8, 10933-10950.

Eom, T., Hong, J. B., An, S., Park, J. S., & Kim, D. S. (2019). A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking. Ieee Access, 7, 137432-137445.

Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P. (2019). Smart contract security: A software lifecycle perspective. IEEE Access, 7, 150184-150202.

Cornish, P. L., Knowles, S. R., Marchesano, R., Tam, V., Shadowitz, S., Juurlink, D. N., & Etchells, E. E. (2005). Unintended medication discrepancies at the time of hospital admission. Archives of internal medicine, 165(4), 424-429.

Tam, V. C., Knowles, S. R., Cornish, P. L., Fine, N., Marchesano, R., & Etchells, E. E. (2005). Frequency, type and clinical importance of medication history errors at admission to hospital: a systematic review. Cmaj, 173(5), 510-515.


Refbacks

  • There are currently no refbacks.