Search alternatives:
case classification » based classification (Expand Search), class classification (Expand Search), image classification (Expand Search)
codon optimization » wolf optimization (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
case classification » based classification (Expand Search), class classification (Expand Search), image classification (Expand Search)
codon optimization » wolf optimization (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
-
1
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
2
-
3
Implementation of Adaptive Genetic Algorithm for classification problems
Published 2022“…In this article,</p> <p>we propose a genetic algorithm approach to the</p> <p>classification problem. …”
-
4
Individual Transition Label Noise Logistic Regression in Binary Classification for Incorrectly Labeled Data
Published 2021“…<p>We consider a binary classification problem in the case where some observations in the training data are incorrectly labeled. …”
-
5
DataSheet2_Disordered–Ordered Protein Binary Classification by Circular Dichroism Spectroscopy.PDF
Published 2022“…Here, we propose an automatized binary disorder–order classification method by analyzing far-UV CD spectroscopy data. …”
-
6
DataSheet3_Disordered–Ordered Protein Binary Classification by Circular Dichroism Spectroscopy.xlsx
Published 2022“…Here, we propose an automatized binary disorder–order classification method by analyzing far-UV CD spectroscopy data. …”
-
7
DataSheet1_Disordered–Ordered Protein Binary Classification by Circular Dichroism Spectroscopy.PDF
Published 2022“…Here, we propose an automatized binary disorder–order classification method by analyzing far-UV CD spectroscopy data. …”
-
8
-
9
-
10
Parameters of the experiments.
Published 2023“…A well-known locality technique is the <i>k</i>-nearest neighbors (<i>k</i>-NN) algorithm, of which several quantum variants have been proposed; nevertheless, they have not been employed yet as a preliminary step of other QML models. …”
-
11
Quantum pipeline workflow overview.
Published 2023“…A well-known locality technique is the <i>k</i>-nearest neighbors (<i>k</i>-NN) algorithm, of which several quantum variants have been proposed; nevertheless, they have not been employed yet as a preliminary step of other QML models. …”
-
12
-
13
Random forest model performs better than support vector machine algorithms and when it primarily uses spontaneous photopic ERG of 60-s duration in humans.
Published 2023“…All data correspond to binary classification between control and disease cases. …”
-
14
-
15
-
16
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
17
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
18
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
19
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
20
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”