يعرض 1 - 20 نتائج من 34 نتيجة بحث عن '(( binary mask global optimization algorithm ) OR ( binary data processing detection algorithm ))*', وقت الاستعلام: 0.55s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things حسب Ashok Kumar K (21441108)

    منشور في 2025
    "…In general, BRBPNN does not show any optimization adaption methods to determine the optimal parameter for appropriate detection. Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …"
  4. 4
  5. 5

    Algoritmo de detección de odio en español (Algorithm for detection of hate speech in Spanish) حسب Elias Said-Hung (10790310)

    منشور في 2024
    "…</li></ul><h2>Training Process</h2><h3>Pre-workout</h3><ul><li>Batch size: 16</li><li>Epochs: 5</li><li>Learning rate: 2e-5 with 10% warmup steps</li><li>Early stopping with patience=2</li></ul><h3>Fine-tuning</h3><ul><li>Batch size: 128</li><li>Epochs: 5</li><li>Learning rate: 2e-5 with 10% warmup steps</li><li>Early stopping with patience=2</li><li>Custom metrics:</li><li>Recall for non-hate class</li><li>Precision for hate class</li><li>F1-score (weighted)</li><li>AUC-PR</li><li>Recall at precision=0.9 (non-hate)</li><li>Precision at recall=0.9 (hate)</li></ul><h2>Evaluation Metrics</h2><p dir="ltr">The model is evaluated using:</p><ul><li>Macro recall, precision, and F1-score</li><li>One-vs-Rest AUC</li><li>Accuracy</li><li>Metrics by class</li><li>Confusion matrix</li></ul><h2>Requirements</h2><p dir="ltr">The following Python packages are required (see requirements.txt for the full list):</p><ul><li>TensorFlow</li><li>Transformers</li><li>scikit-learn</li><li>pandas</li><li>datasets</li><li>matplotlib</li><li>seaborn</li></ul><h2>Usage</h2><p dir="ltr">The model expects input data with the following specifications:</p><ol><li><b>Data Format</b>:</li></ol><ul><li>CSV file or Pandas DataFrame</li><li>Mandatory column name: <code>text</code> (type string)</li><li>Optional column name: <code>label</code> (type integer, 0 or 1) if available for evaluation</li></ul><ol><li><b>Text Preprocessing</b>:</li></ol><ul><li>Text will be automatically converted to lowercase during processing</li><li>Maximum length: 128 tokens (longer texts will be truncated)</li><li>Special characters, URLs, and emojis must remain in the text (the tokenizer handles these)</li></ul><ol><li><b>Label Encoding</b>:</li></ol><ul><li><code>0</code> = No hateful content (including neutral/positive content)</li><li>1 = Hate speech</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at:Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …"
  6. 6
  7. 7

    Data set constituents. حسب Rémy Peyret (14691736)

    منشور في 2023
    "…The high performance of the algorithm at both centers shows that the calibration process is efficient. …"
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Results of the model on test sets 1 and 2. حسب Rémy Peyret (14691736)

    منشور في 2023
    "…The high performance of the algorithm at both centers shows that the calibration process is efficient. …"
  13. 13

    Scanners and staining methods. حسب Rémy Peyret (14691736)

    منشور في 2023
    "…The high performance of the algorithm at both centers shows that the calibration process is efficient. …"
  14. 14

    GSE96058 information. حسب Sepideh Zununi Vahed (9861298)

    منشور في 2024
    "…</p><p>Results</p><p>In this study, five main steps were followed for the analysis of mRNA expression data: reading, preprocessing, feature selection, classification, and SHAP algorithm. …"
  15. 15

    The performance of classifiers. حسب Sepideh Zununi Vahed (9861298)

    منشور في 2024
    "…</p><p>Results</p><p>In this study, five main steps were followed for the analysis of mRNA expression data: reading, preprocessing, feature selection, classification, and SHAP algorithm. …"
  16. 16
  17. 17

    Related studies on IDS using deep learning. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  18. 18

    The architecture of the BI-LSTM model. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  19. 19

    Comparison of accuracy and DR on UNSW-NB15. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  20. 20

    Comparison of DR and FPR of UNSW-NB15. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"