Showing 1 - 20 results of 55 for search '(( binary a case classification algorithm ) OR ( binary pairs codon optimization algorithm ))', query time: 0.51s Refine Results
  1. 1

    MSE for ILSTM algorithm in binary classification. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  2. 2
  3. 3

    Implementation of Adaptive Genetic Algorithm for classification problems by Dr.E.N. Ganesh (12315038)

    Published 2022
    “…In this article,</p> <p>we propose a genetic algorithm approach to the</p> <p>classification problem. …”
  4. 4

    Individual Transition Label Noise Logistic Regression in Binary Classification for Incorrectly Labeled Data by Seokho Lee (10088)

    Published 2021
    “…<p>We consider a binary classification problem in the case where some observations in the training data are incorrectly labeled. …”
  5. 5

    DataSheet2_Disordered–Ordered Protein Binary Classification by Circular Dichroism Spectroscopy.PDF by András Micsonai (801004)

    Published 2022
    “…Here, we propose an automatized binary disorder–order classification method by analyzing far-UV CD spectroscopy data. …”
  6. 6

    DataSheet3_Disordered–Ordered Protein Binary Classification by Circular Dichroism Spectroscopy.xlsx by András Micsonai (801004)

    Published 2022
    “…Here, we propose an automatized binary disorder–order classification method by analyzing far-UV CD spectroscopy data. …”
  7. 7

    DataSheet1_Disordered–Ordered Protein Binary Classification by Circular Dichroism Spectroscopy.PDF by András Micsonai (801004)

    Published 2022
    “…Here, we propose an automatized binary disorder–order classification method by analyzing far-UV CD spectroscopy data. …”
  8. 8
  9. 9
  10. 10

    Parameters of the experiments. by Enrico Zardini (17382523)

    Published 2023
    “…A well-known locality technique is the <i>k</i>-nearest neighbors (<i>k</i>-NN) algorithm, of which several quantum variants have been proposed; nevertheless, they have not been employed yet as a preliminary step of other QML models. …”
  11. 11

    Quantum pipeline workflow overview. by Enrico Zardini (17382523)

    Published 2023
    “…A well-known locality technique is the <i>k</i>-nearest neighbors (<i>k</i>-NN) algorithm, of which several quantum variants have been proposed; nevertheless, they have not been employed yet as a preliminary step of other QML models. …”
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Summary of LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  17. 17

    SHAP analysis for LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  18. 18

    Comparison of intrusion detection systems. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  19. 19

    Parameter setting for CBOA and PSO. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  20. 20

    NSL-KDD dataset description. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”