Search alternatives:
codon optimization » wolf optimization (Expand Search)
robust detection » object detection (Expand Search), point detection (Expand Search), first detection (Expand Search)
primary data » primary care (Expand Search)
binary base » binary mask (Expand Search), ciliary base (Expand Search), binary image (Expand Search)
codon optimization » wolf optimization (Expand Search)
robust detection » object detection (Expand Search), point detection (Expand Search), first detection (Expand Search)
primary data » primary care (Expand Search)
binary base » binary mask (Expand Search), ciliary base (Expand Search), binary image (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
MLP vs classification algorithms.
Published 2024“…Software defects are the primary concern, and software defect prediction (SDP) plays a crucial role in detecting faulty modules early and planning effective testing to reduce maintenance costs. …”
-
11
-
12
Related studies on IDS using deep learning.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
13
The architecture of the BI-LSTM model.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
14
Comparison of accuracy and DR on UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
15
Comparison of DR and FPR of UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
16
-
17
Trace, Machine Learning of Signal Images for Trace-Sensitive Mass Spectrometry: A Case Study from Single-Cell Metabolomics
Published 2019“…However, extraction of trace-abundance signals from complex data sets (<i>m</i>/<i>z</i> value, separation time, signal abundance) that result from ultrasensitive studies requires improved data processing algorithms. …”
-
18
Trace, Machine Learning of Signal Images for Trace-Sensitive Mass Spectrometry: A Case Study from Single-Cell Metabolomics
Published 2019“…However, extraction of trace-abundance signals from complex data sets (<i>m</i>/<i>z</i> value, separation time, signal abundance) that result from ultrasensitive studies requires improved data processing algorithms. …”
-
19
Risperidone.zip.
Published 2025“…Signal detection was performed using the reporting odds ratio, proportional reporting ratio, Bayesian confidence propagation neural network, and multi-item gamma Poisson shrinker algorithms.…”
-
20
Basic Information on AE reports for Risperidone.
Published 2025“…Signal detection was performed using the reporting odds ratio, proportional reporting ratio, Bayesian confidence propagation neural network, and multi-item gamma Poisson shrinker algorithms.…”