منابع مشابه
Using K-NN SVMs for Performance Improvement and Comparison to K-Highest Lagrange Multipliers Selection
Support Vector Machines (SVM) can perform very well on noise free data sets and can usually achieve good classification accuracies when the data is noisy. However, because of the overfitting problem, the accuracy decreases if the SVM is modeled improperly or if the data is excessively noisy or nonlinear. For SVM, most of the misclassification occurs when the test data lies closer to the decisio...
متن کاملK-NN Classifier for Relationally Encrypted Data
With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attack. IP is an internet protocol each and every system having a unique address to use this address to communicate to the internet. The...
متن کاملFast k-NN search
Random projection trees have proven to be effective for approximate nearest neighbor searches in high dimensional spaces where conventional methods are not applicable due to excessive usage of memory and computational time. We show that building multiple trees on the same data can improve the performance even further, without significantly increasing the total computational cost of queries when...
متن کاملConformal k-NN Anomaly Detector for Univariate Data Streams
Anomalies in time-series data give essential and often actionable information in many applications. In this paper we consider a model-free anomaly detection method for univariate time-series which adapts to non-stationarity in the data stream and provides probabilistic abnormality scores based on the conformal prediction paradigm. Despite its simplicity the method performs on par with complex p...
متن کاملDes Secured K-nn Query over Secure Data in Clouds
Protecting databases or data contents from the web world environment is a tough task for a company. Because every Company/ Financial Institute/ Hospital was hiding their customers or end users list secretly and will not open for all. But now Tom’s gang (Hackers) made this possible and tries stealing the data and major portion. In these conditions securing the data outsourcing area such as web h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2019
ISSN: 2227-524X
DOI: 10.14419/ijet.v8i4.29803