Results for ' K-nearest neighbor'

987 found
Order:
  1.  31
    A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor.G. Komarasamy & K. V. Archana - 2023 - Journal of Intelligent Systems 32 (1).
    In the case of magnetic resonance imaging (MRI) imaging, image processing is crucial. In the medical industry, MRI images are commonly used to analyze and diagnose tumor growth in the body. A number of successful brain tumor identification and classification procedures have been developed by various experts. Existing approaches face a number of obstacles, including detection time, accuracy, and tumor size. Early detection of brain tumors improves options for treatment and patient survival rates. Manually segmenting brain tumors from a significant (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  14
    Empirical Study on Indicators Selection Model Based on Nonparametric K-Nearest Neighbor Identification and R Clustering Analysis.Yan Liu, Zhan-Jiang Li & Xue-jun Zhen - 2018 - Complexity 2018:1-9.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  30
    Hubness-aware shared neighbor distances for high-dimensional k-nearest neighbor classification.Nenad Tomašev & Dunja Mladenić - 2012 - In Emilio Corchado, Vaclav Snasel, Ajith Abraham, Michał Woźniak, Manuel Grana & Sung-Bae Cho (eds.), Hybrid Artificial Intelligent Systems. Springer. pp. 116--127.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  15
    A Novel Index Method for K Nearest Object Query over Time-Dependent Road Networks.Yajun Yang, Hanxiao Li, Junhu Wang, Qinghua Hu, Xin Wang & Muxi Leng - 2019 - Complexity 2019:1-18.
    Knearest neighbor search is an important problem in location-based services and has been well studied on static road networks. However, in real world, road networks are often time-dependent; i.e., the time for traveling through a road always changes over time. Most existing methods forkNN query build various indexes maintaining the shortest distances for some pairs of vertices on static road networks. Unfortunately, these methods cannot be used for the time-dependent road networks because the shortest distances always change over time. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  9
    Our Neighbours, Ourselves: Contemporary Reflections on Survival.Homi K. Bhabha - 2011 - De Gruyter.
    With the Hegel Lecture 2010, held by Homi K. Bhabha, the Dahlem Humanities Center is launching the Open Access publication of the series. In his talk, Bhabha evokes the spirit of Hegel in an attempt to understand contemporary issues of ethical witness, historical memory and the rights and representations of minorities in the cultural sphere. Who is our neighbour today? What does hospitality mean for our times? Why is the recognition of others such an agonizing encounter with the alterity of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  51
    Chaos in a Quantum Dot with Spin-Orbit Coupling.K.-F. Berggren & T. Ouchterlony - 2001 - Foundations of Physics 31 (2):233-242.
    Level statistics and nodal point distribution in a rectangular semiconductor quantum dot are studied for different degrees of spin-orbit coupling. The chaotic features occurring from the spin-orbit coupling have no classical counterpart. Using experimental values for GaSb/InAs/GaSb semiconductor quantum wells we find that level repulsion can lead to the semi-Poisson distribution for nearest level separations. Nodal lines and nodal points are also investigated. Comparison is made with nodal point distributions for fully chaotic states.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  9
    Animal Ethics and Theology: The Lens of the Good Samaritan.Daniel K. Miller - 2011 - Routledge.
    In this book, Daniel K. Miller articulates a new vision of human and animal relationships based on the foundational love ethic within Christianity. Framed around Jesus' parable of the Good Samaritan, Animal Ethics and Theologythoughtfully examines the shortcomings of utilitarian and rights-based approaches to animal ethics. By considering the question of animals within the Christian concept of neighbourly love, Miller provides an alternative narrative for understanding the complex relationships that humans have with other animals. This book addresses significant theological questions (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8. The Heyday of Teleology and Early Modern Philosophy.Jeffrey K. McDonough - 2011 - Midwest Studies in Philosophy 35 (1):179-204.
    This paper offers a non-traditional account of what was really at stake in debates over the legitimacy of teleology and teleological explanations in the later medieval and early modern periods. It is divided into four main sections. The first section highlights two defining features of ancient and early medieval views on teleology, namely, that teleological explanations are on a par (or better) with efficient causal explanations, and that the objective goodness of outcomes may explain their coming about. The second section (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  9.  57
    Place Geography and the Ethics of Care: Introductory Remarks on the Geographies of Ethics, Responsibility and Care.Cheryl McEwan & Michael K. Goodman - 2010 - Ethics, Place and Environment 13 (2):103-112.
    In a recent review article, Jeff Popke (2006, p. 510) calls for a ‘more direct engagement with theories of ethics and responsibility’ on the part of human geographers, and for a reinscription of the social as a site of ethics and responsibility. This requires that we also continue to develop ways of thinking through our responsibilities toward unseen others—both unseen neighbours and distant others—and to cultivate a renewed sense of social interconnectedness. Popke suggests that a feminist-inspired ethic of care might (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  21
    Becoming the Neighbor: Virtue Theory and the Problem of Neighbor Identity.Samuel K. Roberts - 2008 - Interpretation: A Journal of Bible and Theology 62 (2):146-155.
    Ethical theories consistent with Christian moral sensibilities must assure each neighbor's dignity and recognize his or her unique needs. While utilitarian ethics and duty-based ethics may fail to some degree in these respects, virtue ethics offers perspectives that echo more faithfully the parable of the Good Samaritan.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  16
    Whisper Before You Go.John K. Petty - 2015 - Narrative Inquiry in Bioethics 5 (1):17-19.
    In lieu of an abstract, here is a brief excerpt of the content:Whisper Before You GoJohn K PettyDavid came with a bang.1A momentary prelude from a dysphonic chorus of pagers announce “Level 1 Pediatric Trauma—MVC ejected” before the abrupt crescendo of the trauma bay doors opening. He is maybe two. Maybe three–years–old. It is hard to tell when a child is strapped in, strapped down, nonverbal, intubated, and alone.The flight team speaks for him, “Four–year–old boy improperly restrained in a single–vehicle (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  30
    Christian Ethics: A Very Short Introduction_, and: _Christian Ethics: A Brief History_, and: _Behaving in Public: How to Do Christian Ethics.Beth K. Haile - 2012 - Journal of the Society of Christian Ethics 32 (2):195-198.
    In lieu of an abstract, here is a brief excerpt of the content:Reviewed by:Christian Ethics: A Very Short Introduction, and: Christian Ethics: A Brief History, and: Behaving in Public: How to Do Christian EthicsBeth K. HaileChristian Ethics: A Very Short Introduction D. Stephen Long Oxford: Oxford University Press, 2010. 144 pp. $11.95Christian Ethics: A Brief History Michael Banner West Sussex, UK: Wiley-Blackwell, 2009. 160 pp. $24.95Behaving in Public: How to Do Christian Ethics Nigel Biggar Grand Rapids, Mich.: Eerdmans, 2011. 142 (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  41
    Growth factors as survival factors: Regulation of apoptosis.Mary K. L. Collins, Gordon R. Perkins, Gemma Rodriguez-Tarduchy, Maria Angela Nieto & Abelardo López-Rivas - 1994 - Bioessays 16 (2):133-138.
    Apoptosis is now widely recognized as a common form of cell death and represents a mechanism of cell clearance in many physiological situations where deletion of cells is required. Peptide growth factors, initially characterised as stimulators of cell proliferation, have now been shown to inhibit death in many cell types. Deprivation of growth factors leads to the induction of apoptosis, i.e. condensation of chromatin and degradation in oligonucleosomesized fragments, formation of plasma and nuclear membrane blebs and cell fragmentation into apoptotic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  11
    Descriptions of Ānvīkṣikī in the Texts of Classical India and the Nature of Analytic Philosophy.Vladimir K. Shokhin - 2023 - Studia Humana 12 (3):24-31.
    The author enters an already old dispute, that is, whether a countеrpart of the notion of philosophy could be encountered in the traditional India, upholds the view that the term ānvīkṣikī (lit. “investigation”) was nearest to it and traces its meaning along the texts on dharma, politics, poetics and philosophy properly. Two main avenues to the understanding of philosophy’s vocations in India have been paved in the Mānavadharmaśāstra, along with the commentaries thereon and by Kamandaki, the author of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  5
    The Rohingya Crisis: A Moral, Ethnographic, and Policy Assessment.Norman K. Swazo & Tawfique M. Haque - 2020 - Routledge India.
    This book provides a history of the ethnic persecution of the Rohingyas in Myanmar and their disputed ethnic and national identity. It focuses on how the crisis has morphed into a geopolitical encounter among Bangladesh, China, India, and Myanmar. It further explores the moral, ethnographic, and public policy issues in the humanitarian response to the crisis of the Rohingya people. The volume analyzes the question of citizenship for the Rohingyas by analyzing historical documents and interviews which chronicle the status and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  15
    Influence of boundary structure and near neighbor crystallographic orientation on the dynamic damage evolution during shock loading.Juan P. Escobedo, Ellen K. Cerreta, Darcie Dennis-Koller, Carl P. Trujillo & Curt A. Bronkhorst - 2013 - Philosophical Magazine 93 (7):833-846.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  11
    Christian commitments to political nonviolence.Joyce K. Babyak - 2021 - Journal of Religious Ethics 49 (3):519-545.
    Should we as religious ethicists seek to understand what traditions other than our own or our own area of scholarship have to say about particular ethical issues as knowledge parallel to our own, or can we allow what we learn to make a difference in our own ethical positions? Writing from the perspective of Christian ethics, the author argues that we can indeed allow what we learn to inform Christian ethical evaluations and to shape ethical conclusions, with neighbor love (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  23
    Cultural Transmission, Evolution, and Revolution in Vocal Displays: Insights From Bird and Whale Song.Ellen C. Garland & Peter K. McGregor - 2020 - Frontiers in Psychology 11:544929.
    Culture, defined as shared behavior or information within a community acquired through some form of social learning from conspecifics, is now suggested to act as a second inheritance system. Cultural processes are important in a wide variety of vertebrate species. Birdsong provides a classic example of cultural processes: cultural transmission, where changes in a shared song are learned from surrounding conspecifics, and cultural evolution, where the patterns of songs change through time. This form of cultural transmission of information has features (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  9
    The History of linguistics in the Low Countries.Jan Noordegraaf, C. H. M. Versteegh & E. F. K. Koerner (eds.) - 1992 - Philadelphia: John Benjamins.
    The importance of the Low Countries as a centre for the study of foreign languages is well-known. The mutual relationship between the Dutch grammatical tradition and the Western European context has, however, been largely neglected. In this collection of papers on the history of linguistics in the Low Countries the editors have made an effort to present the Dutch tradition in connection with that of the neighbouring countries. Three articles by Claes, Dibbets and Klifman deal with the earliest stages of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  21
    Nearest neighbor analysis of psychological spaces.Amos Tversky & J. Wesley Hutchinson - 1986 - Psychological Review 93 (1):3-22.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  22.  12
    Nearest neighbour diagnostic statistics on the accuracy of APT solute cluster characterisation.Leigh T. Stephenson, Michael P. Moody, Baptiste Gault & Simon P. Ringer - 2013 - Philosophical Magazine 93 (8):975-989.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  2
    Deep Large Margin Nearest Neighbor for Gait Recognition.Wanjiang Xu - 2021 - Journal of Intelligent Systems 30 (1):604-619.
    Gait recognition in video surveillance is still challenging because the employed gait features are usually affected by many variations. To overcome this difficulty, this paper presents a novel Deep Large Margin Nearest Neighbor (DLMNN) method for gait recognition. The proposed DLMNN trains a convolutional neural network to project gait feature onto a metric subspace, under which intra-class gait samples are pulled together as small as possible while inter-class samples are pushed apart by a large margin. We provide an (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  10
    Design and Evaluation of Outlier Detection Based on Semantic Condensed Nearest Neighbor.Nagaraju Devarakonda & M. Rao Batchanaboyina - 2019 - Journal of Intelligent Systems 29 (1):1416-1424.
    Social media contain abundant information about the events or news occurring all over the world. Social media growth has a greater impact on various domains like marketing, e-commerce, health care, e-governance, and politics, etc. Currently, Twitter was developed as one of the social media platforms, and now, it is one of the most popular social media platforms. There are 1 billion user’s profiles and millions of active users, who post tweets daily. In this research, buzz detection in social media was (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  15
    用例ベースによるテンス・アスペクト・モダリティの日英翻訳.馬 青 村田 真樹 - 2001 - Transactions of the Japanese Society for Artificial Intelligence 16:20-28.
    We have developed a new method for Japanese-to-English translation of tense, aspect, and modality that uses an example-based method. In this method the similarity between input and example sentences is defined as the degree of semantic matching between the expressions at the ends of the sentences. Our method also uses the k-nearest neighbor method in order to exclude the effects of noise; for example, wrongly tagged data in the bilingual corpora. Experiments show that our method can translate tenses, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  6
    Analysis and Prediction of CET4 Scores Based on Data Mining Algorithm.Hongyan Wang - 2021 - Complexity 2021:1-11.
    This paper presents the concept and algorithm of data mining and focuses on the linear regression algorithm. Based on the multiple linear regression algorithm, many factors affecting CET4 are analyzed. Ideas based on data mining, collecting history data and appropriate to transform, using statistical analysis techniques to the many factors influencing the CET-4 test were analyzed, and we have obtained the CET-4 test result and its influencing factors. It was found that the linear regression relationship between the degrees of fit (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  11
    An Ensemble Learning Model for Short-Term Passenger Flow Prediction.Xiangping Wang, Lei Huang, Haifeng Huang, Baoyu Li, Ziyang Xia & Jing Li - 2020 - Complexity 2020:1-13.
    In recent years, with the continuous improvement of urban public transportation capacity, citizens’ travel has become more and more convenient, but there are still some potential problems, such as morning and evening peak congestion, imbalance between the supply and demand of vehicles and passenger flow, emergencies, and social local passenger flow surged due to special circumstances such as activities and inclement weather. If you want to properly guide the local passenger flow and make a reasonable deployment of operating buses, it (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  5
    Sparse Graph Embedding Based on the Fuzzy Set for Image Classification.Minghua Wan, Mengting Ge, Tianming Zhan, Zhangjing Yang, Hao Zheng & Guowei Yang - 2021 - Complexity 2021:1-10.
    In recent years, many face image feature extraction and dimensional reduction algorithms have been proposed for linear and nonlinear data, such as local-based graph embedding algorithms or fuzzy set algorithms. However, the aforementioned algorithms are not very effective for face images because they are always affected by overlaps and sparsity points in the database. To solve the problems, a new and effective dimensional reduction method for face recognition is proposed—sparse graph embedding with the fuzzy set for image classification. The aim (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  9
    Image retrieval based on weighted nearest neighbor tag prediction.Xiancheng Ding, Dayang Jiang & Qi Yao - 2022 - Journal of Intelligent Systems 31 (1):589-600.
    With the development of communication and computer technology, the application of big data technology has become increasingly widespread. Reasonable, effective, and fast retrieval methods for querying information from massive data have become an important content of current research. This article provides an image retrieval method based on the weighted nearest neighbor label prediction for the problem of automatic image annotation and keyword image retrieval. In order to improve the performance of the test method, scientific experimental verification was implemented. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  6
    Recognition of Consumer Preference by Analysis and Classification EEG Signals.Mashael Aldayel, Mourad Ykhlef & Abeer Al-Nafjan - 2021 - Frontiers in Human Neuroscience 14.
    Neuromarketing has gained attention to bridge the gap between conventional marketing studies and electroencephalography -based brain-computer interface research. It determines what customers actually want through preference prediction. The performance of EEG-based preference detection systems depends on a suitable selection of feature extraction techniques and machine learning algorithms. In this study, We examined preference detection of neuromarketing dataset using different feature combinations of EEG indices and different algorithms for feature extraction and classification. For EEG feature extraction, we employed discrete wavelet transform (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  68
    Ensemble Machine Learning Model for Classification of Spam Product Reviews.Muhammad Fayaz, Atif Khan, Javid Ur Rahman, Abdullah Alharbi, M. Irfan Uddin & Bader Alouffi - 2020 - Complexity 2020:1-10.
    Nowadays, online product reviews have been at the heart of the product assessment process for a company and its customers. They give feedback to a company on improving product quality, planning, and monitoring its business schemes in order to increase sale and gain more profit. They are also helpful for customers to select the right products in less effort and time. Most companies make spam reviews of products in order to increase the products sales and gain more profit. Detecting spam (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Using Neutrosophic Trait Measures to Analyze Impostor Syndrome in College Students after COVID-19 Pandemic with Machine Learning.Riya Eliza Shaju, Meghana Dirisala, Muhammad Ali Najjar, Ilanthenral Kandasamy, Vasantha Kandasamy & Florentin Smarandache - 2023 - Neutrosophic Sets and Systems 60:317-334.
    Impostor syndrome or Impostor phenomenon is a belief that a person thinks their success is due to luck or external factors, not their abilities. This psychological trait is present in certain groups like women. In this paper, we propose a neutrosophic trait measure to represent the psychological concept of the trait-anti trait using refined neutrosophic sets. This study analysed a group of 200 undergraduate students for impostor syndrome, perfectionism, introversion and self-esteem: after the COVID pandemic break in 2021. Data labelling (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  12
    Extreme Gradient Boosting Algorithm for Predicting Shear Strengths of Rockfill Materials.Mahmood Ahmad, Ramez A. Al-Mansob, Kazem Reza Kashyzadeh, Suraparb Keawsawasvong, Mohanad Muayad Sabri Sabri, Irfan Jamil & Arnold C. Alguno - 2022 - Complexity 2022:1-11.
    For the safe and economical construction of embankment dams, the mechanical behaviour of the rockfill materials used in the dam’s shell must be analyzed. The characterization of rockfill materials with specified shear strength is difficult and expensive due to the presence of particles greater than 500 mm in diameter. This work investigates the feasibility of using an extreme gradient boosting computing paradigm to estimate the shear strength of rockfill materials. To train and validate the proposed XGBoost model, a total of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  13
    An Enhanced Machine Learning Framework for Type 2 Diabetes Classification Using Imbalanced Data with Missing Values.Kumarmangal Roy, Muneer Ahmad, Kinza Waqar, Kirthanaah Priyaah, Jamel Nebhen, Sultan S. Alshamrani, Muhammad Ahsan Raza & Ihsan Ali - 2021 - Complexity 2021:1-21.
    Diabetes is one of the most common metabolic diseases that cause high blood sugar. Early diagnosis of such a condition is challenging due to its complex interdependence on various factors. There is a need to develop critical decision support systems to assist medical practitioners in the diagnosis process. This research proposes developing a predictive model that can achieve a high classification accuracy of type 2 diabetes. The study consisted of two fundamental parts. Firstly, the study investigated handling missing data adopting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  19
    Prediction via Similarity: Biomedical Big Data and the Case of Cancer Models.Giovanni Valente, Giovanni Boniolo & Fabio Boniolo - 2023 - Philosophy and Technology 36 (1):1-20.
    In recent years, the biomedical field has witnessed the emergence of novel tools and modelling techniques driven by the rise of the so-called Big Data. In this paper, we address the issue of predictability in biomedical Big Data models of cancer patients, with the aim of determining the extent to which computationally driven predictions can be implemented by medical doctors in their clinical practice. We show that for a specific class of approaches, called k-Nearest Neighbour algorithms, the ability to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  7
    Data Mining Approach Improving Decision-Making Competency along the Business Digital Transformation Journey: A Case Study – Home Appliances after Sales Service.Hyrmet Mydyti - 2021 - Seeu Review 16 (1):45-65.
    Data mining, as an essential part of artificial intelligence, is a powerful digital technology, which makes businesses predict future trends and alleviate the process of decision-making and enhancing customer experience along their digital transformation journey. This research provides a practical implication – a case study - to provide guidance on analyzing information and predicting repairs in home appliances after sales services business. The main benefit of this practical comparative study of various classification algorithms, by using the Weka tool, is the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  3
    Rough Set Approach toward Data Modelling and User Knowledge for Extracting Insights.Xiaoqun Liao, Shah Nazir, Junxin Shen, Bingliang Shen & Sulaiman Khan - 2021 - Complexity 2021:1-9.
    Information is considered to be the major part of an organization. With the enhancement of technology, the knowledge level is increasing with the passage of time. This increase of information is in volume, velocity, and variety. Extracting meaningful insights is the dire need of an individual from such information and knowledge. Visualization is a key tool and has become one of the most significant platforms for interpreting, extracting, and communicating information. The current study is an endeavour toward data modelling and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  12
    Research on Stratum Identification Method Based on TBM Tunneling Characteristic Parameters.Wei Wu, Jingbo Guo, Jie Li, Ji Sun, Haoran Qi & Ximing Chen - 2022 - Complexity 2022:1-12.
    In order to obtain continuous stratum information during TBM tunneling, using TBM tunneling parameters, stratum recognition is carried out through the K-nearest neighbor model, and the model is improved by the entropy weight method to improve the stratum recognition rate. By analyzing the correlation between TBM tunneling characteristic parameters and stratum, the tunneling characteristic parameter vector which is most sensitive to the stratum is obtained by sensitivity analysis, and the stratum recognition model based on the K-nearest (...) algorithm is established. Aiming at the problem that the model has a large error in complex formation recognition, a formation recognition model based on the entropy weight K-nearest neighbor algorithm is established, and the wrong data of the K-nearest neighbor model is recalculated. The recognition rate of the stratum in the new model is increased from 90.95% to 98.55%. The results show that the K-nearest neighbor model has a better recognition effect for the interval with single stratum distribution, and the recognition rate of entropy weight K-nearest neighbor model for complex stratum is significantly improved, which provides an effective method to obtain stratum information by using tunneling characteristic parameters. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  10
    A Hybrid Feature Selection and Ensemble Approach to Identify Depressed Users in Online Social Media.Jingfang Liu & Mengshi Shi - 2022 - Frontiers in Psychology 12.
    Depression has become one of the most common mental illnesses, and the widespread use of social media provides new ideas for detecting various mental illnesses. The purpose of this study is to use machine learning technology to detect users of depressive patients based on user-shared content and posting behaviors in social media. At present, the existing research mostly uses a single detection method, and the unbalanced class distribution often leads to a low recognition rate. In addition, a large number of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  13
    Hand rehabilitation assessment system using leap motion controller.Miri Weiss Cohen & Daniele Regazzoni - 2020 - AI and Society 35 (3):581-594.
    This paper presents an approach for monitoring exercises of hand rehabilitation for post stroke patients. The developed solution uses a leap motion controller as hand-tracking device and embeds a supervised machine learning. The K-nearest neighbor methodology is adopted for automatically characterizing the physiotherapist or helper hand movement resulting a unique movement pattern that constitutes the basis of the rehabilitation process. In the second stage, an evaluation of the patients rehabilitation exercises results is compared to the movement pattern of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  95
    Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models.Basim Mahbooba, Radhya Sahal, Martin Serrano & Wael Alosaimi - 2021 - Complexity 2021:1-23.
    To design and develop AI-based cybersecurity systems ), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree, K (...) neighbour, random forest, and naïve Bayes. The four deep learning techniques are LSTM and GRU. Two datasets are used to classify the IDS attack type, including wireless sensor network detection system and KDD Cup network intrusion dataset. A detailed comparison of the eight techniques’ performance using all features and selected features is made by measuring the accuracy, precision, recall, and F1-score. Considering the findings related to the data, methodology, and expert accountability, interpretability for AI-based solutions also becomes demanded to enhance trust in the IDS. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  9
    Performance Analysis of an Optimized ANN Model to Predict the Stability of Smart Grid.Ayushi Chahal, Preeti Gulia, Nasib Singh Gill & Jyotir Moy Chatterjee - 2022 - Complexity 2022:1-13.
    The stability of the power grid is concernment due to the high demand and supply to smart cities, homes, factories, and so on. Different machine learning and deep learning models can be used to tackle the problem of stability prediction for the energy grid. This study elaborates on the necessity of IoT technology to make energy grid networks smart. Different prediction models, namely, logistic regression, naïve Bayes, decision tree, support vector machine, random forest, XGBoost, k-nearest neighbor, and optimized (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  18
    Hand rehabilitation assessment system using leap motion controller.Miri Weiss Cohen & Daniele Regazzoni - 2020 - AI and Society 35 (3):581-594.
    This paper presents an approach for monitoring exercises of hand rehabilitation for post stroke patients. The developed solution uses a leap motion controller as hand-tracking device and embeds a supervised machine learning. The K-nearest neighbor methodology is adopted for automatically characterizing the physiotherapist or helper hand movement resulting a unique movement pattern that constitutes the basis of the rehabilitation process. In the second stage, an evaluation of the patients rehabilitation exercises results is compared to the movement pattern of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  15
    Interplay of ordering and spinodal decomposition in the formation of ordered precipitates in binary fcc alloys: Role of second nearest-neighbor interactions.William A. Soffa, David E. Laughlin & Nitin Singh - 2010 - Philosophical Magazine 90 (1-4):287-304.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  3
    Rumor Situation Discrimination Based on Empirical Mode Decomposition Correlation Dimension.Yanwen Xin & Fengming Liu - 2021 - Complexity 2021:1-12.
    To effectively identify network rumors and block their spread, this paper uses fractal theory to analyze a network rumor spreading situation time series, reveal its inner regularity, extract features, and establish a network rumor recognition model. The model is based on an empirical mode decomposition correlation dimension and K-nearest neighbor approach. Firstly, a partition function is used to determine if the time series of the rumor spreading situation is a uniform fractal process. Secondly, the rumor spreading situation is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  11
    Application of Normalized Compression Distance and Lempel-Ziv Jaccard Distance in Micro-electrode Signal Stream Classification for the Surgical Treatment of Parkinson’s Disease.Kamil Ząbkiewicz - 2018 - Studies in Logic, Grammar and Rhetoric 56 (1):45-57.
    Parkinson’s Disease can be treated with the use of microelectrode recording and stimulation. This paper presents a data stream classifier that analyses raw data from micro-electrodes and decides whether the measurements were taken from the subthalamic nucleus (STN) or not. The novelty of the proposed approach is based on the fact that distances based on raw data are used. Two distances are investigated in this paper, i.e. Normalized Compression Distance (NCD) and Lempel-Ziv Jaccard Distance (LZJD). No new features needed to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  83
    Machine Learning-Based Analysis of Digital Movement Assessment and ExerGame Scores for Parkinson's Disease Severity Estimation.Dunia J. Mahboobeh, Sofia B. Dias, Ahsan H. Khandoker & Leontios J. Hadjileontiadis - 2022 - Frontiers in Psychology 13.
    Neurodegenerative Parkinson's Disease is one of the common incurable diseases among the elderly. Clinical assessments are characterized as standardized means for PD diagnosis. However, relying on medical evaluation of a patient's status can be subjective to physicians' experience, making the assessment process susceptible to human errors. The use of ICT-based tools for capturing the status of patients with PD can provide more objective and quantitative metrics. In this vein, the Personalized Serious Game Suite and intelligent Motor Assessment Tests, produced within (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  13
    Arabic sentiment analysis about online learning to mitigate covid-19.Manal Mostafa Ali - 2021 - Journal of Intelligent Systems 30 (1):524-540.
    The Covid-19 pandemic is forcing organizations to innovate and change their strategies for a new reality. This study collects online learning related tweets in Arabic language to perform a comprehensive emotion mining and sentiment analysis (SA) during the pandemic. The present study exploits Natural Language Processing (NLP) and Machine Learning (ML) algorithms to extract subjective information, determine polarity and detect the feeling. We begin with pulling out the tweets using Twitter APIs and then preparing for intensive preprocessing. Second, the National (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  12
    Early Detection of Seasonal Outbreaks from Twitter Data Using Machine Learning Approaches.Samina Amin, Muhammad Irfan Uddin, Duaa H. alSaeed, Atif Khan & Muhammad Adnan - 2021 - Complexity 2021:1-12.
    Seasonal outbreaks have several different periods that occur primarily during winter in temperate regions, while influenza may occur throughout the year in tropical regions, triggering outbreaks more irregularly. Similarly, dengue occurs in the star of the rainy season in early May and reaches its peak in late June. Dengue and flu brought an impact on various countries in the years 2017–2019 and streaming Twitter data reveals the status of dengue and flu outbreaks in the most affected regions. This research work (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  10
    A Prediction Method of Electromagnetic Environment Effects for UAV LiDAR Detection System.Min Huang, Dandan Liu, Liyun Ma, Jingyang Wang, Yuming Wang & Yazhou Chen - 2021 - Complexity 2021:1-14.
    With the rapid development of science and technology, UAVs have become a new type of weapon in the informatization battlefield by their advantages of low loss and zero casualty rate. In recent years, UAV navigation electromagnetic decoy and electromagnetic interference crashes have activated widespread international attention. The UAV LiDAR detection system is susceptible to electromagnetic interference in a complex electromagnetic environment, which results in inaccurate detection and causes the mission to fail. Therefore, it is very necessary to predict the effects (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987