Showing 1 - 16 results of 16 for search '(( binary mask model optimization algorithm ) OR ( binary data process reflection algorithm ))', query time: 0.50s Refine Results
  1. 1
  2. 2

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf by Helena Mihaljević (8541108)

    Published 2020
    “…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
  3. 3

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml by Helena Mihaljević (8541108)

    Published 2020
    “…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
  4. 4

    A* Path-Finding Algorithm to Determine Cell Connections by Max Weng (22327159)

    Published 2025
    “…</p><p dir="ltr">Astrocytes were dissociated from E18 mouse cortical tissue, and image data were processed using a Cellpose 2.0 model to mask nuclei. Pixel paths were classified using a z-score brightness threshold of 1.21, optimized for noise reduction and accuracy. …”
  5. 5
  6. 6
  7. 7

    Flowchart scheme of the ML-based model. by Noshaba Qasmi (20405009)

    Published 2024
    “…<b>I)</b> Testing data consisting of 20% of the entire dataset. <b>J)</b> Optimization of hyperparameter tuning. <b>K)</b> Algorithm selection from all models. …”
  8. 8

    Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment by Jianfang Cao (1881379)

    Published 2019
    “…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…”
  9. 9
  10. 10

    Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish) by Daniel Pérez Palau (11097348)

    Published 2024
    “…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …”
  11. 11

    Related studies on IDS using deep learning. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  12. 12

    The architecture of the BI-LSTM model. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  13. 13

    Comparison of accuracy and DR on UNSW-NB15. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  14. 14

    Comparison of DR and FPR of UNSW-NB15. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  15. 15
  16. 16