Showing 1 - 16 results of 16 for search '(( binary data processing reflection algorithm ) OR ( binary data surface optimization algorithm ))', query time: 0.62s Refine Results
  1. 1
  2. 2

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf by Helena Mihaljević (8541108)

    Published 2020
    “…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
  3. 3

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml by Helena Mihaljević (8541108)

    Published 2020
    “…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    PathOlOgics_RBCs Python Scripts.zip by Ahmed Elsafty (16943883)

    Published 2023
    “…</p><p><br></p><p dir="ltr">In the fifth measurement technique, the numbers of sharp <b>surface projections/protrusions</b> were calculated by initially applying Canny's edge detection algorithm to generate an edge map of the cell mask image. …”
  9. 9

    Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment by Jianfang Cao (1881379)

    Published 2019
    “…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…”
  10. 10
  11. 11

    Related studies on IDS using deep learning. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  12. 12

    The architecture of the BI-LSTM model. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  13. 13

    Comparison of accuracy and DR on UNSW-NB15. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  14. 14

    Comparison of DR and FPR of UNSW-NB15. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  15. 15
  16. 16

    Machine Learning-Ready Dataset for Cytotoxicity Prediction of Metal Oxide Nanoparticles by Soham Savarkar (21811825)

    Published 2025
    “…</p><p dir="ltr"><b>Applications and Model Compatibility:</b></p><p dir="ltr">The dataset is optimized for use in supervised learning workflows and has been tested with algorithms such as:</p><p dir="ltr">Gradient Boosting Machines (GBM),</p><p dir="ltr">Support Vector Machines (SVM-RBF),</p><p dir="ltr">Random Forests, and</p><p dir="ltr">Principal Component Analysis (PCA) for feature reduction.…”