بدائل البحث:
processing detection » protein detection (توسيع البحث), phishing detection (توسيع البحث)
task optimization » based optimization (توسيع البحث), phase optimization (توسيع البحث), path optimization (توسيع البحث)
data processing » image processing (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
a task » _ task (توسيع البحث)
processing detection » protein detection (توسيع البحث), phishing detection (توسيع البحث)
task optimization » based optimization (توسيع البحث), phase optimization (توسيع البحث), path optimization (توسيع البحث)
data processing » image processing (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
a task » _ task (توسيع البحث)
-
1
-
2
Joint Detection of Change Points in Multichannel Single-Molecule Measurements
منشور في 2021الموضوعات: -
3
-
4
Proposed Algorithm.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
5
-
6
Comparisons between ADAM and NADAM optimizers.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
7
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
منشور في 2025"…In general, BRBPNN does not show any optimization adaption methods to determine the optimal parameter for appropriate detection. Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …"
-
8
The Pseudo-Code of the IRBMO Algorithm.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
9
-
10
IRBMO vs. meta-heuristic algorithms boxplot.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
11
IRBMO vs. feature selection algorithm boxplot.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
12
An Example of a WPT-MEC Network.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
13
Algoritmo de detección de odio en español (Algorithm for detection of hate speech in Spanish)
منشور في 2024"…</li></ul><h2>Training Process</h2><h3>Pre-workout</h3><ul><li>Batch size: 16</li><li>Epochs: 5</li><li>Learning rate: 2e-5 with 10% warmup steps</li><li>Early stopping with patience=2</li></ul><h3>Fine-tuning</h3><ul><li>Batch size: 128</li><li>Epochs: 5</li><li>Learning rate: 2e-5 with 10% warmup steps</li><li>Early stopping with patience=2</li><li>Custom metrics:</li><li>Recall for non-hate class</li><li>Precision for hate class</li><li>F1-score (weighted)</li><li>AUC-PR</li><li>Recall at precision=0.9 (non-hate)</li><li>Precision at recall=0.9 (hate)</li></ul><h2>Evaluation Metrics</h2><p dir="ltr">The model is evaluated using:</p><ul><li>Macro recall, precision, and F1-score</li><li>One-vs-Rest AUC</li><li>Accuracy</li><li>Metrics by class</li><li>Confusion matrix</li></ul><h2>Requirements</h2><p dir="ltr">The following Python packages are required (see requirements.txt for the full list):</p><ul><li>TensorFlow</li><li>Transformers</li><li>scikit-learn</li><li>pandas</li><li>datasets</li><li>matplotlib</li><li>seaborn</li></ul><h2>Usage</h2><p dir="ltr">The model expects input data with the following specifications:</p><ol><li><b>Data Format</b>:</li></ol><ul><li>CSV file or Pandas DataFrame</li><li>Mandatory column name: <code>text</code> (type string)</li><li>Optional column name: <code>label</code> (type integer, 0 or 1) if available for evaluation</li></ul><ol><li><b>Text Preprocessing</b>:</li></ol><ul><li>Text will be automatically converted to lowercase during processing</li><li>Maximum length: 128 tokens (longer texts will be truncated)</li><li>Special characters, URLs, and emojis must remain in the text (the tokenizer handles these)</li></ul><ol><li><b>Label Encoding</b>:</li></ol><ul><li><code>0</code> = No hateful content (including neutral/positive content)</li><li>1 = Hate speech</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at:Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …"
-
14
-
15
-
16
Related Work Summary.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
17
Simulation parameters.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
18
Training losses for N = 10.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
19
Normalized computation rate for N = 10.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
20
Summary of Notations Used in this paper.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"