يعرض 1 - 9 نتائج من 9 نتيجة بحث عن '(( binary research process reflection algorithm ) OR ( binary b codon optimization algorithm ))', وقت الاستعلام: 0.47s تنقيح النتائج
  1. 1
  2. 2

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf حسب Helena Mihaljević (8541108)

    منشور في 2020
    "…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
  3. 3

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml حسب Helena Mihaljević (8541108)

    منشور في 2020
    "…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
  4. 4

    Related studies on IDS using deep learning. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
  5. 5

    The architecture of the BI-LSTM model. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
  6. 6

    Comparison of accuracy and DR on UNSW-NB15. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
  7. 7

    Comparison of DR and FPR of UNSW-NB15. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…Multiple network attacks by an intruder are unavoidable. Our research targets the critical issue of class imbalance in intrusion detection, a reflection of the real-world scenario where legitimate network activities significantly out number malicious ones. …"
  8. 8
  9. 9

    Twitter dataset حسب mehdi khalil (20153943)

    منشور في 2024
    "…The dataset includes:</p><ul><li><b>Raw Social Media Posts</b>: A diverse range of tweets that reflect various topics and sentiments.</li><li><b>Labeling</b>: Each post is annotated with binary labels indicating its authenticity (real or fake).…"