Search alternatives:
code optimization » codon optimization (Expand Search), model optimization (Expand Search), dose optimization (Expand Search)
robust detection » object detection (Expand Search), point detection (Expand Search), first detection (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
code optimization » codon optimization (Expand Search), model optimization (Expand Search), dose optimization (Expand Search)
robust detection » object detection (Expand Search), point detection (Expand Search), first detection (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
Related studies on IDS using deep learning.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
7
The architecture of the BI-LSTM model.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
8
Comparison of accuracy and DR on UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
9
Comparison of DR and FPR of UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
10
Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish)
Published 2024“…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …”
-
11
-
12
-
13
-
14
Image_1_Validation of miRNA signatures for ovarian cancer earlier detection in the pre-diagnosis setting using machine learning approaches.pdf
Published 2024“…We employed the extreme gradient boosting (XGBoost) algorithm to train a binary classification model using 70% of the available data, while the model was tested on the remaining 30% of the dataset.…”
-
15
Fortran & C++: design fractal-type optical diffractive element
Published 2022“…</p> <p>(4) export geometry/optics raw data and figures for binary DOE devices.</p> <p><br></p> <p>[Wolfram Mathematica code "square_triangle_DOE.nb"]:</p> <p>read the optimized binary DOE document (after Fortran & C++ code) to calculate its diffractive fields for comparison.…”
-
16
Supplementary Material 8
Published 2025“…By mitigating class imbalance, SMOTE enables robust AMR detection, aiding in early identification of drug-resistant bacteria and informing antibiotic stewardship efforts.…”