يعرض 141 - 160 نتائج من 201 نتيجة بحث عن '(( binary a based optimization algorithm ) OR ( binary data wolf optimization algorithm ))*', وقت الاستعلام: 0.65s تنقيح النتائج
  1. 141

    Memory storage behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  2. 142

    Elite search behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  3. 143

    Description of the datasets. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  4. 144

    S and V shaped transfer functions. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  5. 145

    S- and V-Type transfer function diagrams. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  6. 146

    Collaborative hunting behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  7. 147

    Friedman average rank sum test results. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  8. 148

    IRBMO vs. variant comparison adaptation data. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  9. 149
  10. 150

    Testing results for classifying AD, MCI and NC. حسب Nicodemus Songose Awarayi (18414494)

    منشور في 2024
    "…<div><p>This study aims to develop an optimally performing convolutional neural network to classify Alzheimer’s disease into mild cognitive impairment, normal controls, or Alzheimer’s disease classes using a magnetic resonance imaging dataset. …"
  11. 151

    Summary of existing CNN models. حسب Nicodemus Songose Awarayi (18414494)

    منشور في 2024
    "…<div><p>This study aims to develop an optimally performing convolutional neural network to classify Alzheimer’s disease into mild cognitive impairment, normal controls, or Alzheimer’s disease classes using a magnetic resonance imaging dataset. …"
  12. 152

    Parameter settings. حسب Yang Cao (53545)

    منشور في 2024
    "…<div><p>Differential Evolution (DE) is widely recognized as a highly effective evolutionary algorithm for global optimization. …"
  13. 153

    Presentation_1_Modified GAN Augmentation Algorithms for the MRI-Classification of Myocardial Scar Tissue in Ischemic Cardiomyopathy.PPTX حسب Umesh C. Sharma (10785063)

    منشور في 2021
    "…Currently, there are no optimized deep-learning algorithms for the automated classification of scarred vs. normal myocardium. …"
  14. 154
  15. 155
  16. 156

    Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish) حسب Daniel Pérez Palau (11097348)

    منشور في 2024
    "…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …"
  17. 157

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  18. 158

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  19. 159

    Comparison of intrusion detection systems. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  20. 160

    Parameter setting for CBOA and PSO. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"