{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:12Z","timestamp":1730227152659,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10073060","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"509-514","source":"Crossref","is-referenced-by-count":0,"title":["Implementation of KNN Algorithm with BOA to Predict the Cancer with more Accurate Way"],"prefix":"10.1109","author":[{"given":"Mizan Ali","family":"Khan","sequence":"first","affiliation":[{"name":"Sanskriti University,Department of Computer Science Engineering,Mathura,Uttar Pradesh,India"}]},{"given":"Abhishek","family":"Sharma","sequence":"additional","affiliation":[{"name":"Chandigarh Engineering College,Department of Computer Science &#x0026; Engineering,Jhanjeri,India"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"415","article-title":"A novel hybrid technique application of fuzzy immune response and k-nn method for prostate cancer detection","volume":"37","author":"Ahan","year":"2007","journal-title":"Comput. Biol. Med."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113374"},{"first-page":"58","article-title":"An Instances oriented Training Algorithm for Categorization in Data Streams with Idea Change","volume-title":"Proc. Spec. Sess. - Revis. Pap. 11th Mex. Int. Conf. Artif. Intell. 2012 Adv. Artif. Intell. Appl. MICAI 2012","key":"ref3"},{"journal-title":"Citeseer","first-page":"515","article-title":"The compressed k nearest rule (Corresp.)","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054809"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-2053-3_11"},{"key":"ref7","first-page":"56","article-title":"Single-arm study of brentuximab vedotin in patients with relapsed or refractory Hodgkin lymphoma who are ineligible for stem cell transplantation or multiagent chemotherapy","volume":"101","author":"W. J","year":"2016","journal-title":"Haematologica"},{"key":"ref8","first-page":"426","article-title":"The P-TreeAlgebra 1\u2019=","year":"2002","journal-title":"by Q. Ding, M. Khan, A. Roy, and W. Perrizo"},{"volume":"1317","volume-title":"Lecture Series in Ai Technology","author":"Leman","key":"ref9"},{"issue":"the","key":"ref10","first-page":"25","article-title":"Quick compressed nearest neighbour rule","volume-title":"22nd international conference on deep learning, ACM","author":"Angiulli"},{"issue":"1","key":"ref11","first-page":"46","article-title":"Private maintaining K-nearest neighbour categorization","volume":"1","author":"Zhan","year":"2005","journal-title":"International Journal of Network Security"},{"first-page":"436","volume-title":"An Enhanced KNN Text Categorization Algorithm Which is based on Segmentation, by X. Li","year":"2010","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.08.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/7817-1105"},{"key":"ref15","first-page":"55","article-title":"Secured KNN calculation on encrypted information without key exchange with querying users is described in [15]","author":"Zhu","journal-title":"Cloud Comput. 2013 - Proc. 2013 Int. Work. Secur. Cloud Comput"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2364027"},{"key":"ref17","first-page":"280","article-title":"Data categorization with k-NN utilising new characters resonance term frequency resemblance formula","volume-title":"2015 Int. Symp. Math. Sci. Comput. Res. iSMSC 2015 - Proc.","author":"Jung"},{"issue":"5","key":"ref18","doi-asserted-by":"crossref","first-page":"69","DOI":"10.20943\/01201605.6975","article-title":"Application of KNN and Naive Bayes Algorithms in Bank and Healthcare Domain","volume":"13","author":"Rahangdale","year":"2016","journal-title":"International Journal of Computer Science Issues"},{"journal-title":"Regist.","article-title":"Combination of rapid hybrid categorization and K value optimisation in KNN for video facial recognition software","author":"Septiana","key":"ref19"},{"key":"ref20","first-page":"81","article-title":"A performance rating KNN technique for multi label categorization","volume":"25","author":"Chiang","year":"2012","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"ref21","first-page":"109","article-title":"An Enhanced KNN Text Categorization Algorithms Based on the k Methd and Rough Set","volume-title":"Proceedings of the 2018 IHMSC, 10th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"1","author":"Tan"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2014.7.1.06"},{"issue":"August","key":"ref23","first-page":"24","volume-title":"A Comparative Analysis on Chinese Text Summarization Methods, PRICAI 2000 Study. Text Web Min.","author":"He","year":"2000"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312647"},{"issue":"978-3-540-47887-4","key":"ref25","first-page":"978-3-540-43704-8","volume-title":"K-nearest Neighbor Identification on Geospatial Streaming Data Utilizing P-trees, M. Khan, Q. Ding, and W. Perrizo, Springer, Berlin, Heidelberg.","volume":"2336","year":"2002"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10073060.pdf?arnumber=10073060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:38:20Z","timestamp":1707831500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10073060","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}