咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 76 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 163 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 137 篇 工学
    • 85 篇 计算机科学与技术...
    • 37 篇 电气工程
    • 29 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 21 篇 软件工程
    • 8 篇 仪器科学与技术
    • 8 篇 石油与天然气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 机械工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
    • 2 篇 水利工程
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
  • 25 篇 理学
    • 8 篇 数学
    • 7 篇 化学
    • 6 篇 物理学
    • 5 篇 生物学
    • 3 篇 海洋科学
    • 2 篇 地球物理学
    • 2 篇 生态学
  • 25 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 医学
    • 3 篇 临床医学
  • 3 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 163 篇 knn algorithm
  • 19 篇 machine learning
  • 9 篇 data mining
  • 5 篇 text classificat...
  • 5 篇 svm algorithm
  • 4 篇 random forest
  • 4 篇 clustering
  • 4 篇 big data
  • 4 篇 indoor positioni...
  • 4 篇 face recognition
  • 4 篇 artificial intel...
  • 4 篇 k-means
  • 3 篇 large screen
  • 3 篇 fall detection
  • 3 篇 multi-touch cont...
  • 3 篇 similarity
  • 3 篇 iot
  • 3 篇 classification
  • 3 篇 integrated with ...
  • 2 篇 internet of thin...

机构

  • 2 篇 univ granada dep...
  • 1 篇 chinese acad sci...
  • 1 篇 nankai univ coll...
  • 1 篇 woosong univ dep...
  • 1 篇 korea elect powe...
  • 1 篇 kth royal inst t...
  • 1 篇 liaoning normal ...
  • 1 篇 taiz univ comp s...
  • 1 篇 mangalore inst t...
  • 1 篇 southwest petr u...
  • 1 篇 samsung r&d inst...
  • 1 篇 college of minin...
  • 1 篇 china meteorol a...
  • 1 篇 univ mohaghegh a...
  • 1 篇 school of civil ...
  • 1 篇 univ new s wales...
  • 1 篇 new york bot gar...
  • 1 篇 cankaya univ dep...
  • 1 篇 galgotias univ s...
  • 1 篇 shangluo univ el...

作者

  • 2 篇 zhao yamin
  • 2 篇 lian zhikang
  • 2 篇 wei lin
  • 2 篇 martin-martin ma...
  • 2 篇 evans lance s.
  • 2 篇 guo xiaomin
  • 2 篇 an wang
  • 2 篇 lin yang
  • 2 篇 zhang jianhua
  • 2 篇 zhou zhiwei
  • 2 篇 zhang mengmeng
  • 2 篇 sharma abhishek
  • 2 篇 bullejos manuel
  • 1 篇 zhang qingmao
  • 1 篇 ren zhuojun
  • 1 篇 jena lambodar
  • 1 篇 awatade pratik
  • 1 篇 silva everson de...
  • 1 篇 sowmya b. j.
  • 1 篇 cai ying

语言

  • 149 篇 英文
  • 10 篇 其他
  • 3 篇 中文
检索条件"主题词=KNN Algorithm"
163 条 记 录,以下是71-80 订阅
排序:
Optimum NN algorithms Parameters on the UJIIndoorLoc for Wi-Fi Fingerprinting Indoor Positioning Systems  32
Optimum NN Algorithms Parameters on the UJIIndoorLoc for Wi-...
收藏 引用
32nd International Telecommunication Networks and Applications Conference (ITNAC)
作者: Ebaid, Emad Navaie, Keivan Univ Lancaster Sch Comp & Commun Lancaster England
Wi-Fi fingerprinting techniques are commonly used in Indoor Positioning Systems (IPS) as Wi-Fi signal is available in most indoor settings. In such systems, the position is estimated based on a matching algorithm betw... 详细信息
来源: 评论
Research on the application of situation form judgment in command training based on K nearest neighbor data mining algorithm  2
Research on the application of situation form judgment in co...
收藏 引用
2nd International Conference on Applied Mathematics, Modelling, and Intelligent Computing (CAMMIC)
作者: Guo, Weilan Zhang, Yujie Wang, Xin Zhang, Jieqiang Wangchao, Luomeng Lu, Fengyun China Peoples Police Univ Fac Grad Studies Langfang 065000 Hebei Peoples R China China Peoples Police Univ Coll Police Command Langfang 065000 Hebei Peoples R China
Based on k nearest neighbor algorithm, this paper discusses the training method of assistant commander to judge the situation in command training, and focuses on judging the situation level of a certain area in a spec... 详细信息
来源: 评论
Big data outlier detection model based on improved density peak algorithm
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2021年 第4期40卷 6185-6194页
作者: Shao, Mengliang Qi, Deyu Xue, Huili Guangzhou Univ South China Inst Software Engn Dept Comp Sci Guangzhou Peoples R China South China Univ Technol Res Inst Comp Syst Guangzhou Guangdong Peoples R China Guangzhou Nanyang Polytech Coll Sch Informat Engn Guangzhou Peoples R China
Outlier detection is an important branch of data mining. This paper proposes an advanced fast density peak outlier detection algorithm based on the characteristics of big data. The algorithm is an outlier detection me... 详细信息
来源: 评论
A dynamic anomaly detection method of building energy consumption based on data mining technology
收藏 引用
ENERGY 2023年 第PartA期263卷
作者: Lei, Lei Wu, Bing Fang, Xin Chen, Li Wu, Hao Liu, Wei Zhejiang Sci Tech Univ Sch Civil Engn & Architecture Hangzhou 310018 Peoples R China Guangxi Vocat & Tech Coll Commun Coll Civil Engn & Architecture 1258 Kunlun Ave Nanning 530216 Peoples R China Alibaba Grp Alibaba Cloud 969 West Wen Yi Rd Hangzhou 311121 Peoples R China KTH Royal Inst Technol Dept Civil & Architectural Engn Div Sustainable Bldg Brinellvagen 23 S-10044 Stockholm Sweden
Due to the equipment failure and inappropriate operation strategy, it is often difficult to achieve energy-efficient building. Anomaly detection of building energy consumption is one of the important approaches to imp... 详细信息
来源: 评论
Human motion intention recognition based on EMG signal and angle signal
收藏 引用
COGNITIVE COMPUTATION AND SYSTEMS 2021年 第1期3卷 37-47页
作者: Sun, Baixin Cheng, Guang Dai, Quanmin Chen, Tianlin Liu, Weifeng Xu, Xiaorong Beijing Union Univ Beijing Key Lab Informat Serv Engn Beijing Peoples R China Beijing Union Univ Sch Urban Rail Transit & Logist Beijing Peoples R China
As the traditional single biological signal or physical signal is not good at predicting the angle value of the knee joint, the innovative fusion of biological signals and physical signals is used to analyze the movem... 详细信息
来源: 评论
Research on Fault Diagnosis of Wind Power Generator Blade Based on SC-SMOTE and knn
收藏 引用
JOURNAL OF INFORMATION PROCESSING SYSTEMS 2020年 第4期16卷 870-881页
作者: Peng, Cheng Chen, Qing Zhang, Longxin Wan, Lanjun Yuan, Xinpan Hunan Univ Technol Sch Comp Sci Zhuzhou Peoples R China
Because SCADA monitoring data of wind turbines are large and fast changing, the unbalanced proportion of data in various working conditions makes it difficult to process fault feature data. The existing methods mainly... 详细信息
来源: 评论
Using python libraries and k-Nearest neighbors algorithms to delineate syn-sedimentary faults in sedimentary porous media
收藏 引用
MARINE AND PETROLEUM GEOLOGY 2023年 153卷
作者: Martin-Martin, Manuel Bullejos, Manuel Cabezas, David Alcala, Francisco Javier Univ Alicante Dept Ciencias Tierra & Medio Ambiente AP 99 Alicante 03080 Spain Univ Granada Dept Algebra Granada 18010 Spain Univ Granada Dept Anal Matematico Granada 18010 Spain Dept Desertificac & Geoecol Estn Expt Zonas Aridas Almeria 04120 Spain Univ Autonoma Chile Fac Ingn Inst Ciencias Quim Aplicadas Santiago 7500138 Chile Univ Alicante Dept Ciencias Tierra & Medio Ambiente Campus San VicenteSan Vicente Raspeig Alicante 03080 Spain
This paper introduces a methodology based on Python libraries and machine learning k-Nearest Neighbors (knn) algorithms to create an interactive 3D HTML model (3D_Vertical_Sections_Faults_***) that combines 2D grain-s... 详细信息
来源: 评论
Smart Machine Health Prediction Based on Machine Learning in Industry Environment
收藏 引用
INFORMATION 2023年 第3期14卷 181页
作者: Yeruva, Sagar Gunuganti, Jeshmitha Kalva, Sravani Salkuti, Surender Reddy Kim, Seong-Cheol VNR Vignana Jyothi Inst Engn & Technol Dept CSE AIML & IoT Hyderabad 500090 India VNR Vignana Jyothi Inst Engn & Technol Dept CSE Hyderabad 500090 India Woosong Univ Dept Railroad & Elect Engn Daejeon 34606 South Korea
In an industrial setting, consistent production and machine maintenance might help any company become successful. Machine health checking is a method of observing the status of a machine to predict mechanical mileage ... 详细信息
来源: 评论
A Novel Forecastive Anomaly Based Botnet Revelation Framework for Competing Concerns in Internet of Things
收藏 引用
JOURNAL OF APPLIED SECURITY RESEARCH 2021年 第2期16卷 258-278页
作者: Bhatt, Priyang Thakker, Bhaskar Gujarat Technol Univ Comp Engn Ahmadabad 382424 Gujarat India Symbiosis Int Deemed Univ SIDU Symbiosis Inst Technol SIT Pune Maharashtra India
With internet, billions and millions of devices in Internet of Things (IoT) are interconnected and are communicated with other devices through messaging bots. The messaging bots are sometimes controlled by the attacke... 详细信息
来源: 评论
Discrimination of unknown complex network based on the information of local nodes  40
Discrimination of unknown complex network based on the infor...
收藏 引用
40th Chinese Control Conference (CCC)
作者: Liu, Siyuan Jin, Yue Wu, Yongjun Li, Kun Zhang, Jianlei Nankai Univ Coll Artificial Intelligence Dept Automat Tianjin 300071 Peoples R China Nankai Univ Tianjin Key Lab Intelligent Robot Tianjin 300071 Peoples R China Tiangong Univ Sch Math Sci Tianjin 300387 Peoples R China Hebei Univ Technol Sch Civil & Transportat Engn Tianjin 300401 Peoples R China
At present, the study on complex network and game theory has been spread across the fields of science and engineering. The research contents on these topics mainly focus on the evolution results of structured populati... 详细信息
来源: 评论