Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
In this work, we focus on obtaining insights of the performances of some well-known machine learning image classification techniques (k-NN, Support Vector Machine, randomized decision tree and one ...
1 School of Computer Science and Technology, Yibin University, Yibin, China 2 School of Computer and Software, Southwest Petroleum University, Chengdu, China Ever since Density Peak Clustering (DPC) ...
ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
1 Yibin University, School of Computer Science and Technology, Yibin, China 2 Southwest Petroleum University, School of Computer and Software, Chengdu, China Network security is the core guarantee for ...
Abstract: The K-nearest neighbors (kNNs) algorithm, a cornerstone of supervised learning, relies on similarity measures constrained by real-number-based distance metrics. A critical limitation of ...
ABSTRACT: To ensure the efficient operation and timely maintenance of wind turbines, thereby enhancing energy security, it is critical to monitor the operational status of wind turbines and promptly ...
Dr. James McCaffrey of Microsoft Research presents a full demo of k-nearest neighbors classification on mixed numeric and categorical data. Compared to other classification techniques, k-NN is easy to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results