

GYM MEMBERS EXERCISE PREDICTION USING MACHINE LEARNING
Abstract
This paper documents an overall methodology to predict what exercise preferences a gym member might have through machine learning techniques .cyber footprints left behind a gym management system, a wearable, and member feedback, we implement several machine learning techniques to generate predictions and customize personal training programs accordingly. This study underlines the significance of data-driven strategies in enhancing member satisfaction and optimizing training outcomes.
References
Balaji, S., and Deepak, N.R. (2016). Performance of Uplink Channels and Software Implementation for Image Communication in 4G Networks. In: Software Engineering Perspectives and Application in Intelligent Systems, edited by Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., and Prokopova, Z. Advances in
Intelligent Systems and Computing, vol. 465, CSOC, 2016.
Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep. 2024.
B, Omprakash & Metan, Jyoti & Konar, Anisha & Patil, Kavitha & KK, Chiranthan. (2024). Unravelling Malware Using Co- Existence Of Features. 1-6. 10.1109/ICAIT61638.2024.10690795.
Rezni S and Deepak N R, “Challenges and Innovations in Routing for Flying Ad Hoc Networks: A Survey of Current Protocols”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 64–74, Sep. 2024.
"Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network," by N. R. Deepak and S. Balaji, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015, pp.1–5, doi: 10.1109/ICCIC.2015.7435774
.
N R, Deepak & Sriramulu, Balaji. (2015). A Review of Techniques used in EPS and 4G-LTE in Mobility Schemes. International Journal of Computer Applications. 109. 30-38. 10.5120/19219-1018.
Patil, Kavitha S et al. “Hybrid and Adaptive Cryptographic-based secure authentication approach in Io T based applications using hybrid encryption.” Pervasive Mob. Compute. 82 (2022): 101552.
Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622-0_10
Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep. 2024.
3. Rezni S and Deepak N R, “Challenges and Innovations in Routing for Flying Ad Hoc Networks: A Survey of Current Protocols”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 64–74, Sep. 2024.
Refbacks
- There are currently no refbacks.