2017 IEEE International Conference on Big Data (Big Data) 2017
DOI: 10.1109/bigdata.2017.8258395
|View full text |Cite
|
Sign up to set email alerts
|

Toward predicting medical conditions using k-nearest neighbors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Two machine learning algorithms, which were the k-nearest neighbor (KNN) and the artificial neural network (ANN), were used for developing prediction models. The KNN algorithm is one of the most extensively used data mining tool to classify and predict patterns of health informatics data [36,37]. The KNN algorithm predicts that similar objects would exist in close proximity; as a result, it labels the class of the target based on its surrounding k neighbors [38].…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Two machine learning algorithms, which were the k-nearest neighbor (KNN) and the artificial neural network (ANN), were used for developing prediction models. The KNN algorithm is one of the most extensively used data mining tool to classify and predict patterns of health informatics data [36,37]. The KNN algorithm predicts that similar objects would exist in close proximity; as a result, it labels the class of the target based on its surrounding k neighbors [38].…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…The numbers of k examined ranged from 1 to 10 and the hidden neurons examined were 2, 3, 4, 5 and 6. These values were selected based on suggestions from the KNN and ANN literatures [7,[36][37][38][39][40][41][42]. We found that k = 3 (KNN model) and the hidden neurons = 4 in one hidden layer (ANN model) provided the best prediction accuracy.…”
Section: Feature Selection Proceduresmentioning
confidence: 99%
“…K-NN has been extensively used in the medical eld with a relatively high rate of success compared to other methods like Linear Discriminant Analysis (LDA). 43,44 The basic underlying hypothesis of K-NN is that if two datapoints have a high degree of similarity, there is a high probability that they belong to the same class. In other words, the probability of two data points belonging to the same class is proportional to their degree of proximity or similarity.…”
Section: Discussionmentioning
confidence: 99%
“…Subasi et al [11] used different algorithms for the training of phishing detection models. These algorithms included Artificial Neural Networks (ANN) [1], [12], [13], K-Nearest Neighbor (KNN) [14], Support Vector Machine (SVM) [15], [16], C4.5 Decision Tree [17], [18], Random Forest (RF) [19], etc. According to the analysis results of this experiment, the authors proposed that the dataset provided by the UCI machine learning repository [20] was more suitable for training and prediction through a treestructured algorithm.…”
Section: Heuristics Analysismentioning
confidence: 99%
“…In this study, we collected 24471 phishing sites from PhishTank in the collection model, with 3850 legitimate sites retrieved from the target column of the corresponding is ip address f 16 script block rate f 3 dots f 17 style block rate f 4 is special words f 18 get title feature f 5 url linkin num f 19 is login form f 6 url traffic rank f 20 is with whois f 7 get kbytes f 21 get time f 8 is frame f 22 is redirect f 9 is meta redirect f 23 ipv4 numbers f 10 is meta base64 redirect f 24 ipv6 numbers f 11 same extern domain script rate f 25 organization f 12 same external domain link rate f 26 is alias f 13 same external domain img rate f 27 is weird serial f 14 external a tag same domain f 28 get day age phishing sites. Basically, the number of phishing sites was considerably larger than the number of legitimate sites, because hackers usually imitate a specific legitimate site and design multiple similar phishing sites.…”
Section: Training Datasetmentioning
confidence: 99%