Open Access Open Access  Restricted Access Subscription Access

Predicting Medal Counts In Olympics Using Machine Learning Algorithm

Vedashree G A, Swathi N, Namitha S N, Yashaswini K S, Omprakash B, Deepak N R

Abstract


The major international sports that occur once in every four years are Olympics ,has more than 200 participant nations. It is used for preventing whether the Atlantic is too winning a win a medal in the Olympic game . the studies on Olympic are expecting to predict the total number of medals of The nation and possible to achieve further or country’s performance All the country should do analyse to evaluate previous performance so they get to know their mistake and help to grow in the further. Machine learning in particular boosting algorithms, it has an influence it improves in prediction models.


Full Text:

PDF

References


Ahmed, Y. A., Ahmad, M. N., Ahmad, N., & Zakaria, N. H. (2019). Social media for knowledge-sharing: A systematic literature review. Telematics and Informatics, 37, 72–112.

Fink, A. (2019). Conducting research literature reviews: From the Internet to paper (5th ed.). Sage.

Houlihan, B., Leopkey, B., & MacIntosh, E. (2017). Introduction: Youth, sport and the Youth Olympic Games. International Journal of Sport Management and Marketing, 4/5/6, 237–241.

Bellavia, S., Macconi, M., & Morini, B. (2003). An aMne scaling trust-region approach to bound-constrained nonlinear systems. Applied Numerical Mathematics, 44, 257–280.

120 years of Olympic Dataset, Available: https://www.kaggle.com/datasets/heesoo37/ 120-years-of olympic-history-athletes-and- results.

Deepak, N. R., & Balaji, S. (2016). Uplink channel performance and implementation of software for image communication in 4G network. In R. Silhavy, R. Senkerik, Z. Oplatkova, P. Silhavy, & Z. Prokopova (Eds.), Software engineering perspectives and application in intelligent systems (Vol. 465). Springer.

Pal, R. S., & Deepak, N. R. (2024). Evaluation on mitigating cyber attacks and securing sensitive information with the Adaptive Secure Metaverse Guard (ASMG) algorithm using decentralized security. Journal of Computational Analysis and Applications, 33(2), 656–667.

Omprakash, B., Metan, J., Konar, A., Patil, K., & Chiranthan, K. K. (2024). Unravelling malware using co-existence of features. Proceedings of ICAIT 2024, 1–6.

Rezni, S., & Deepak, N. R. (2024). Challenges and innovations in routing for flying ad hoc networks: A survey of current protocols. Journal of Computational Analysis and Applications, 33(2), 64–74.

Deepak, N. R., & Balaji, S. (2015). Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network. In 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–5).


Refbacks

  • There are currently no refbacks.