بدائل البحث:
reflection algorithm » selection algorithm (توسيع البحث), detection algorithm (توسيع البحث), detection algorithms (توسيع البحث)
process reflection » process regression (توسيع البحث)
codon optimization » wolf optimization (توسيع البحث)
research process » research proposes (توسيع البحث), research projects (توسيع البحث), research project (توسيع البحث)
binary research » primary research (توسيع البحث), bioenergy research (توسيع البحث), biology research (توسيع البحث)
binary b » binary _ (توسيع البحث)
b codon » _ codon (توسيع البحث), b common (توسيع البحث)
reflection algorithm » selection algorithm (توسيع البحث), detection algorithm (توسيع البحث), detection algorithms (توسيع البحث)
process reflection » process regression (توسيع البحث)
codon optimization » wolf optimization (توسيع البحث)
research process » research proposes (توسيع البحث), research projects (توسيع البحث), research project (توسيع البحث)
binary research » primary research (توسيع البحث), bioenergy research (توسيع البحث), biology research (توسيع البحث)
binary b » binary _ (توسيع البحث)
b codon » _ codon (توسيع البحث), b common (توسيع البحث)
-
1
-
2
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf
منشور في 2020"…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
-
3
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml
منشور في 2020"…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
-
4
Related studies on IDS using deep learning.
منشور في 2024"…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
-
5
The architecture of the BI-LSTM model.
منشور في 2024"…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
-
6
Comparison of accuracy and DR on UNSW-NB15.
منشور في 2024"…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
-
7
Comparison of DR and FPR of UNSW-NB15.
منشور في 2024"…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
-
8
-
9
Twitter dataset
منشور في 2024"…The dataset includes:</p><ul><li><b>Raw Social Media Posts</b>: A diverse range of tweets that reflect various topics and sentiments.</li><li><b>Labeling</b>: Each post is annotated with binary labels indicating its authenticity (real or fake).…"