Search alternatives:
reflection algorithm » selection algorithm (Expand Search), detection algorithm (Expand Search), detection algorithms (Expand Search)
streams optimization » stress optimization (Expand Search), surface optimization (Expand Search), step optimization (Expand Search)
process reflection » process regression (Expand Search)
data process » data processing (Expand Search), damage process (Expand Search), data access (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
reflection algorithm » selection algorithm (Expand Search), detection algorithm (Expand Search), detection algorithms (Expand Search)
streams optimization » stress optimization (Expand Search), surface optimization (Expand Search), step optimization (Expand Search)
process reflection » process regression (Expand Search)
data process » data processing (Expand Search), damage process (Expand Search), data access (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
-
1
-
2
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf
Published 2020“…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
-
3
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml
Published 2020“…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
-
4
-
5
-
6
Event-driven data flow processing.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
7
Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment
Published 2019“…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…”
-
8
-
9
Confusion matrix.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
10
Parameter settings.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
11
Dynamic resource allocation process.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
12
Related studies on IDS using deep learning.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
13
The architecture of the BI-LSTM model.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
14
Comparison of accuracy and DR on UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
15
Comparison of DR and FPR of UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
16
-
17