Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » KNN

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Shear capacity estimation of reinforced concrete deep beams using machine learning techniques Pages 53-66 Right click to download the paper Download PDF

Authors: A.I. Quadri, H.A. Soretire, H.I. Babalola, W.K. Kupolati, C. Ackerman, J. Snyman, J.M. Ndambuk

DOI: 10.5267/j.esm.2025.11.001

Keywords: Reinforced Concrete Deep Beams, Shear Capacity, Machine Learning, kNN, M5Rules, Random Forest, SMOReg

Abstract:
Conventionally, the deep beam shear strength is analyzed with codes (mechanics and empirical models). The purpose of this investigation is to provide an alternative way of accurately estimating the shear capacity of Reinforced Concrete Deep Beams (RCDBs), including those with and without shear reinforcements (WOR and WWR), by adopting machine learning models. Four machine learning algorithms: k-Nearest Neighbor (kNN), Random Forest, M5Rules, and Sequential Minimal Optimization for Regression (SMOReg), were considered, and the selection was based on their performance in previous related studies. A database of 733 samples for WWR and 378 samples for WOR was compiled, utilizing 14 and 8 input features, respectively, in each case. WEKA, an open-source software suite, was used in preprocessing the data and also tuning the hyperparameters. SMOReg beat other models for WOR with an R² value of 0.9607, while Random Forest did best for WWR with an R² value of 0.9667 in the testing sets. The shear strengths predicted by the machine learning models were compared to four traditional standard codes. The results show that the machine learning models beat conventional methods by a large margin, while also being consistent with earlier models generated using machine learning. This demonstrates the model's prediction accuracy and robustness.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: ESM | Year: 2026 | Volume: 14 | Issue: 1 | Views: 106 | Reviews: 0

 
2.

Monitoring image-based processes using a PCA-based control chart and a classification technique Pages 39-52 Right click to download the paper Download PDF

Authors: Setareh Kazemi, Seyed Taghi Akhavan Niaki

DOI: 10.5267/j.dsl.2020.10.005

Keywords: SPC, PCA, Classification, LDA, QDA, KNN, SVM

Abstract:
Machine vision systems are among the novel tools proven to be useful in different applications, among which monitoring and controlling manufacturing processes is one of the most important ones. However, due to the complexity resulted from high-dimensional image data and their inherent correlations, the acquisition of traditional statistical process control tools seems inapplicable. To overcome the shortcomings of the traditional methods in this regard, a statistical model is proposed in this paper which utilizes the concepts of both the PCA-based T2 control chart and the classification methods to develop a tool capable of controlling an image-based process. By defining the warning zones, collected data taken from an image-based process are classified into more than the two classes related to in-control and out-of-control processes. This helps practitioners to define rules to make it easier to realize when the process is getting out of control. Through simulation, the accuracy performance and the speed of four different types of classifiers including linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), kth nearest neighbors (KNN), and support vector machine (SVM) are assessed in different scenarios, based on which the functionality of the proposed approach is evaluated in in-control and out-of-control conditions.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2021 | Volume: 10 | Issue: 1 | Views: 1803 | Reviews: 0

 
3.

Detecting DDoS attacks using machine learning algorithms and feature selection methods Pages 2307-2318 Right click to download the paper Download PDF

Authors: Mohammed Amin Almaiah, Rana Alrawashdeh, Tayseer Alkhdour, Romel Al-Ali, Gaith Rjoub, Theyazan Aldahyani

DOI: 10.5267/j.ijdns.2024.6.001

Keywords: DDoS Attacks, Machine learning algorithms, Salp swarm algorithm (SSA), PSO, GWO, SVM, KNN, ML

Abstract:
A Distributed Denial of Service (DDoS) attack occurs when an attacker tries to disrupt a network, service or website by flooding huge numbers of packets on the internet traffic. Detecting DDoS attacks serves the goal of spotting and addressing them promptly to reduce their effects on the network, system or service being targeted. Detecting Distributed Denial of Service (DDoS) attacks is crucial, for people, companies and network managers. The detection of DDoS attacks has ranging uses in industries such as network security safeguarding websites, managing cloud services ensuring the security of online systems and services. Detecting DDoS attacks is essential for safeguarding infrastructure upholding service availability and guaranteeing the security of online systems and services. To achieve this objective, we proposed a framework to detect DDoS attacks including six steps. In step one, we start by gathering information, which includes network activity and system records, for operations as well as instances of DDoS attacks. Step two, we identify characteristics of the data collected such as patterns in network traffic, packet details, IP addresses, types of protocols used and more. Step three, we utilize algorithms for feature selection such as Salp Swarm Algorithm (SSA), Gray Wolf Algorithm (GWA), Particle Swarm Algorithm (PSO) to pinpoint the features that can distinguish between normal activities and DDoS attack patterns. After that in step four, we divide the processed dataset into sections for training and testing purposes to develop and assess the machine learning models such as SVM (support vector machine), and KNN (K-nearest neighbor). Step five we develop a classification model using machine learning techniques like decision trees, forests, support vector machines (SVM) logistic regression models or neural networks. Finally, we assess the effectiveness of models through metrics such as accuracy rates, precision levels, recall rates, and F1 scores. The results show that the proposed models achieve high results (99.9%). In summary detecting DDoS attacks is crucial for protecting networks, systems and online services against disruptions.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 1289 | Reviews: 0

 

® 2010-2026 GrowingScience.Com