يعرض 1 - 14 نتائج من 14 نتيجة بحث عن '(( binary task swarm optimization algorithm ) OR ( binary data process reflection algorithm ))*', وقت الاستعلام: 0.41s تنقيح النتائج
  1. 1
  2. 2

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf حسب Helena Mihaljević (8541108)

    منشور في 2020
    "…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
  3. 3

    fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml حسب Helena Mihaljević (8541108)

    منشور في 2020
    "…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …"
  4. 4
  5. 5
  6. 6

    Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment حسب Jianfang Cao (1881379)

    منشور في 2019
    "…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…"
  7. 7
  8. 8

    Thesis-RAMIS-Figs_Slides حسب Felipe Santibañez-Leal (10967991)

    منشور في 2024
    "…<br><br>Finally, although the developed concepts, ideas and algorithms have been developed for inverse problems in geostatistics, the results are applicable to a wide range of disciplines where similar sampling problems need to be faced, included but not limited to design of communication networks, optimal integration and communication of swarms of robots and drones, remote sensing.…"
  9. 9

    Related studies on IDS using deep learning. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  10. 10

    The architecture of the BI-LSTM model. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  11. 11

    Comparison of accuracy and DR on UNSW-NB15. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  12. 12

    Comparison of DR and FPR of UNSW-NB15. حسب Arshad Hashmi (13835488)

    منشور في 2024
    "…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
  13. 13
  14. 14