بدائل البحث:
process optimization » model optimization (توسيع البحث)
reflection algorithm » selection algorithm (توسيع البحث), detection algorithm (توسيع البحث), detection algorithms (توسيع البحث)
process reflection » process regression (توسيع البحث)
climate process » climate project (توسيع البحث)
binary climate » binary image (توسيع البحث)
data process » data processing (توسيع البحث), damage process (توسيع البحث), data access (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
process optimization » model optimization (توسيع البحث)
reflection algorithm » selection algorithm (توسيع البحث), detection algorithm (توسيع البحث), detection algorithms (توسيع البحث)
process reflection » process regression (توسيع البحث)
climate process » climate project (توسيع البحث)
binary climate » binary image (توسيع البحث)
data process » data processing (توسيع البحث), damage process (توسيع البحث), data access (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
-
1
-
2
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf
منشور في 2020"…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
-
3
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml
منشور في 2020"…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
-
4
-
5
-
6
Hyperparameters of the LSTM Model.
منشور في 2025"…The capacity to confront and overcome this obstacle is where machine learning and metaheuristic algorithms shine. This study introduces the Adaptive Dynamic Particle Swarm Optimization enhanced with the Guided Whale Optimization Algorithm (AD-PSO-Guided WOA) for rainfall prediction. …"
-
7
The AD-PSO-Guided WOA LSTM framework.
منشور في 2025"…The capacity to confront and overcome this obstacle is where machine learning and metaheuristic algorithms shine. This study introduces the Adaptive Dynamic Particle Swarm Optimization enhanced with the Guided Whale Optimization Algorithm (AD-PSO-Guided WOA) for rainfall prediction. …"
-
8
Prediction results of individual models.
منشور في 2025"…The capacity to confront and overcome this obstacle is where machine learning and metaheuristic algorithms shine. This study introduces the Adaptive Dynamic Particle Swarm Optimization enhanced with the Guided Whale Optimization Algorithm (AD-PSO-Guided WOA) for rainfall prediction. …"
-
9
Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment
منشور في 2019"…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…"
-
10
-
11
Related studies on IDS using deep learning.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
12
The architecture of the BI-LSTM model.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
13
Comparison of accuracy and DR on UNSW-NB15.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
14
Comparison of DR and FPR of UNSW-NB15.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
15
-
16