Search alternatives:
learning optimization » learning motivation (Expand Search), lead optimization (Expand Search)
design optimization » bayesian optimization (Expand Search)
binary deep » binary depot (Expand Search), ternary deep (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a design » _ design (Expand Search), co design (Expand Search)
learning optimization » learning motivation (Expand Search), lead optimization (Expand Search)
design optimization » bayesian optimization (Expand Search)
binary deep » binary depot (Expand Search), ternary deep (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a design » _ design (Expand Search), co design (Expand Search)
-
41
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
42
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
43
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
44
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
45
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
46
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
47
ROC curve for binary classification.
Published 2024“…To achieve this, we focused the study on addressing the challenge of image noise, which impacts the performance of deep learning models. The study introduced a scheme for enhancing images to improve the quality of the datasets. …”
-
48
Confusion matrix for binary classification.
Published 2024“…To achieve this, we focused the study on addressing the challenge of image noise, which impacts the performance of deep learning models. The study introduced a scheme for enhancing images to improve the quality of the datasets. …”
-
49
-
50
-
51
-
52
Comparisons of computation rate performance for different offloading algorithms.for N = 10, 20, 30.
Published 2025Subjects: -
53
Comparison of total time consumed for different offloading algorithms.for N = 10, 20, 30.
Published 2025Subjects: -
54
-
55
-
56
-
57
-
58
Table_1_An efficient decision support system for leukemia identification utilizing nature-inspired deep feature optimization.pdf
Published 2024“…To optimize feature selection, a customized binary Grey Wolf Algorithm is utilized, achieving an impressive 80% reduction in feature size while preserving key discriminative information. …”
-
59
-
60
Algorithm for generating hyperparameter.
Published 2024“…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …”