Search alternatives:
reflection algorithm » selection algorithm (Expand Search), detection algorithm (Expand Search), detection algorithms (Expand Search)
process reflection » process regression (Expand Search)
primary risk » primary aim (Expand Search), primary role (Expand Search)
data process » data processing (Expand Search), damage process (Expand Search), data access (Expand Search)
risk global » rising global (Expand Search), first global (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
reflection algorithm » selection algorithm (Expand Search), detection algorithm (Expand Search), detection algorithms (Expand Search)
process reflection » process regression (Expand Search)
primary risk » primary aim (Expand Search), primary role (Expand Search)
data process » data processing (Expand Search), damage process (Expand Search), data access (Expand Search)
risk global » rising global (Expand Search), first global (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
-
1
-
2
-
3
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.pdf
Published 2020“…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
-
4
fdata-02-00029_Reflections on Gender Analyses of Bibliographic Corpora.xml
Published 2020“…An author's gender is typically inferred from their name, further reduced to a binary feature by an algorithmic procedure. This and subsequent data processing steps introduce biases whose effects are hard to estimate. …”
-
5
-
6
-
7
-
8
Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment
Published 2019“…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…”
-
9
-
10
Table_1_Enriching the Study Population for Ischemic Stroke Therapeutic Trials Using a Machine Learning Algorithm.pdf
Published 2022“…Patient data were extracted from electronic health records and used to train and test a gradient boosted machine learning algorithm (MLA) to predict the patients' risk of experiencing ischemic stroke from the period of 1 day up to 1 year following the patient encounter. …”
-
11
Image_1_Enriching the Study Population for Ischemic Stroke Therapeutic Trials Using a Machine Learning Algorithm.pdf
Published 2022“…Patient data were extracted from electronic health records and used to train and test a gradient boosted machine learning algorithm (MLA) to predict the patients' risk of experiencing ischemic stroke from the period of 1 day up to 1 year following the patient encounter. …”
-
12
Supplementary Material for: The Therapeutic Evaluation of Steroids in IgA Nephropathy Global (TESTING) Study: Trial Design and Baseline Characteristics
Published 2021“…The Therapeutic Evaluation of STeroids in IgA Nephropathy Global (TESTING) study was designed to assess the benefits and risks of steroids in people with IgAN. …”
-
13
<b>A Primary Care Guide to the Screening and Pharmacologic Management of Chronic Kidney Disease in People Living With Type 2 Diabetes</b>
Published 2025“…<p dir="ltr">This paper reports the expert opinions and recommendations made by primary care physicians (PCPs) to optimize screening and management of chronic kidney disease (CKD) associated with diabetes and presents algorithms to provide a practical and simplified guide for PCPs. …”
-
14
Related studies on IDS using deep learning.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
15
The architecture of the BI-LSTM model.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
16
Comparison of accuracy and DR on UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
17
Comparison of DR and FPR of UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
18
-
19
Assessing individual genetic susceptibility to metabolic syndrome: interpretable machine learning method
Published 2025“…The XGBoost-based SHAP algorithm not only elucidated the global effects of 17 SNPs across all samples, but also described the interaction between SNPs, providing a visual representation of how SNPs impact the prediction of MetS in an individual. …”
-
20