Search

Your search keyword '"k-nearest neighbors algorithm"' showing total 19 results

Search Constraints

Start Over You searched for: Descriptor "k-nearest neighbors algorithm" Remove constraint Descriptor: "k-nearest neighbors algorithm"
19 results on '"k-nearest neighbors algorithm"'

Search Results

1. Poisoning Attacks against Communication and Computing Task Classification and Detection Techniques.

2. A Reaction-Based Optical Fingerprinting Strategy for the Recognition of Fat-Soluble Samples: Discrimination of Motor Oils.

3. Co-Training Semi-Supervised Learning for Fine-Grained Air Quality Analysis.

4. Entropy-Weight-Method-Based Integrated Models for Short-Term Intersection Traffic Flow Prediction.

5. Surface roughness prediction in micro-plasma transferred arc metal additive manufacturing process using K-nearest neighbors algorithm.

6. Rapid testing of irradiation dose in beef and potatoes by reaction-based optical sensing technique.

7. Borsa endeks hareket yönünün çoklu lojistik regresyon ve k-en yakın komşu algoritması ile tahmini.

8. Convolutional Neural Network for Wafer Surface Defect Classification and the Detection of Unknown Defect Class.

9. การศึกษาเปรียบเทียบระหว่างวิธีการหาคุณลักษณะเฉพาะพื้นที่และวิธีการเรียนรู้เชิงลึก สำหรับการค้นคืนรูปภาพลายผ้าไหม

10. การหาคุณลักษณะพิเศษเฉพาะพื้นที่สำหรับการจัดหมวดหมู่รูปภาพลามกอนาจาร.

11. Quantum Algorithm for K-Nearest Neighbors Classification Based on the Metric of Hamming Distance.

12. Breast cancer detection using K-nearest neighbors data mining method obtained from the bow-tie antenna dataset.

13. Determination of the oxidation state of iron by X-ray fluorescence spectroscopy using chemometric approaches.

14. การรู้จำตัวอักษรลายมือเขียนโดยใช้ตัวจำแนกข้อมูลด้วยวิธีการคำนวณเพื่อนบ้านใกล้ที่สุด k ตำแหน่ง - วิจัยเรงสำรวจ

15. Simulation of agricultural logistic processes with k-nearest neighbors algorithm.

16. Neural Network Used for the Fusion of Predictions Obtained by the K-Nearest Neighbors Algorithm Based on Independent Data Sources.

17. A landscape and policy perspective on forest conversion: Long-tailed tit ( Aegithalos caudatus) and the allocation of deciduous forests in southern Sweden.

18. Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems.

19. Application of Machine-Learning Methods to Recognize mitoBK Channels from Different Cell Types Based on the Experimental Patch-Clamp Results.

Catalog

Books, media, physical & digital resources