scroll to top

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "K-nearest neighbor classification"

1 - 10 of 6,142 results for
 "K-nearest neighbor classification"
Results per page:

Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 2, p2641-2659. 19p.

Abstract: Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that ari...

Aspect Level Songs Rating Based Upon Reviews in English.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 2, p2589-2605. 17p.

Abstract: With the advancements in internet facilities, people are more inclined towards the use of online services. The service providers shelve their items for e-users. These users post their feedbacks, reviews, ratings, etc. after the use of the item. The eno...

Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention.

Publication Type: Academic Journal

Source(s): Intelligent Automation & Soft Computing. 2023, Vol. 35 Issue 2, p2431-2447. 17p.

Abstract: The exponential pace of the spread of the digital world has served as one of the assisting forces to generate an enormous amount of information flowing over the network. The data will always remain under the threat of technological suffering where intr...


Publication Type: Academic Journal

Source(s): Scalable Computing: Practice & Experience. Dec2022, Vol. 23 Issue 4, p129-145. 17p.

Abstract: With the evolution of Internet standards and advancements in various Internet and mobile technologies, especially since web 4.0, more and more web and mobile applications emerge such as e-commerce, social networks, online gaming applications and Intern...

Four-body Faddeev-type calculation of the K̅NNN system.

Publication Type: Conference

Source(s): EPJ Web of Conferences. 11/18/2022, Vol. 271, p1-4. 4p.

Abstract: A quasi-bound state in the K̅NNN system caused by strong interactions was studied using dynamically exact four-body Faddeev-type equations. Binding energy and width of the K−ppn state were calculated using three antikaon-nucleon and three nucleon-nucle...

A Neighborhood Model with Both Distance and Quantity Constraints for Multilabel Data.

Publication Type: Academic Journal

Source(s): Computational Intelligence & Neuroscience. 9/19/2022, p1-10. 10p.

Abstract: In this paper, a novel distance-based multilabel classification algorithm is proposed. The proposed algorithm combines k-nearest neighbors (kNN) with neighborhood classifier (NC) to impose double constraints on the quantity and distance of the neighbor...

Classification of Imbalanced Data Set in Financial Field Based on Combined Algorithm.

Publication Type: Academic Journal

Source(s): Mobile Information Systems. 9/14/2022, p1-7. 7p.

Abstract: In view of the imbalance of data categories in financial data mining, a two-stage classification algorithm was proposed based on SVM and KNN to classify imbalanced data. In the first stage, two one-class SVM classifiers are constructed, and the samples...

A Belief Two-Level Weighted Clustering Method for Incomplete Pattern Based on Multiview Fusion.

Publication Type: Academic Journal

Source(s): Computational Intelligence & Neuroscience. 11/30/2022, p1-11. 11p.

Abstract: Incomplete pattern clustering is a challenging task because the unknown attributes of the missing data introduce uncertain information that affects the accuracy of the results. In addition, the clustering method based on the single view ignores the com...

A Novel Method for Network Intrusion Detection.

Publication Type: Academic Journal

Source(s): Scientific Programming. 11/21/2022, Vol. 2022, p1-13. 13p.

Abstract: Intrusion detection is one of the key research directions of network information security. In order to make up for the deficiencies of traditional security technologies such as firewall, encryption, and authentication, by analyzing the characteristics ...

Movement Evaluation Algorithm-Based Form Tracking Technology and Optimal Control of Limbs for Dancers.

Publication Type: Academic Journal

Source(s): Mathematical Problems in Engineering. 10/11/2022, p1-11. 11p.

Abstract: This study designs an optimal control model of dance personnel from tracking technology and limb control based on an action evaluation algorithm by constructing a human action evaluation algorithm model and conducting an in-depth study of dance personn...