Search alternatives:
policy optimization » topology optimization (Expand Search), wolf optimization (Expand Search), process optimization (Expand Search)
from optimization » fox optimization (Expand Search), swarm optimization (Expand Search), codon optimization (Expand Search)
binary basic » binary mask (Expand Search)
basic policy » ai policy (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a from » 1 from (Expand Search), 2 from (Expand Search), 3 from (Expand Search)
policy optimization » topology optimization (Expand Search), wolf optimization (Expand Search), process optimization (Expand Search)
from optimization » fox optimization (Expand Search), swarm optimization (Expand Search), codon optimization (Expand Search)
binary basic » binary mask (Expand Search)
basic policy » ai policy (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a from » 1 from (Expand Search), 2 from (Expand Search), 3 from (Expand Search)
-
61
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
62
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
63
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
64
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
65
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
66
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
67
-
68
Generalized Tensor Decomposition With Features on Multiple Modes
Published 2021“…Our proposal handles a broad range of data types, including continuous, count, and binary observations. …”
-
69
-
70
Silibinin solubilization: combined effect of co-solvency and inclusion complex formation
Published 2024“…The solubility in PBS-ethanol mixtures followed a log-linear model. SLB solubility in the presence of the ethanol co-solvent and HP-β-CD complexing agent was optimized by adopting a genetic algorithm suggesting the phosphate buffer saline solution supplemented by 6%v/v ethanol and 8 mM HP-β-CD as an optimized medium. …”
-
71
Contextual Dynamic Pricing with Strategic Buyers
Published 2024“…This underscores the rate optimality of our policy. Importantly, our policy is not a mere amalgamation of existing dynamic pricing policies and strategic behavior handling algorithms. …”
-
72
Supplementary file 1_Comparative evaluation of fast-learning classification algorithms for urban forest tree species identification using EO-1 hyperion hyperspectral imagery.docx
Published 2025“…</p>Methods<p>Thirteen supervised classification algorithms were comparatively evaluated, encompassing traditional spectral/statistical classifiers—Maximum Likelihood, Mahalanobis Distance, Minimum Distance, Parallelepiped, Spectral Angle Mapper (SAM), Spectral Information Divergence (SID), and Binary Encoding—and machine learning algorithms including Decision Tree (DT), K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Random Forest (RF), and Artificial Neural Network (ANN). …”
-
73
Image processing workflow.
Published 2020“…<p>Raw fluorescent microscope images (a) were processed with a binary segmentation algorithm, and clusters of bacterial cells were manually annotated. …”
-
74
Identification and quantitation of clinically relevant microbes in patient samples: Comparison of three k-mer based classifiers for speed, accuracy, and sensitivity
Published 2019“…All three classifiers identified the organisms present in their default databases from a mock bacterial community of 20 organisms, but only Centrifuge had no false positives. …”
-
75
-
76
Thesis-RAMIS-Figs_Slides
Published 2024“…<br><br>Finally, although the developed concepts, ideas and algorithms have been developed for inverse problems in geostatistics, the results are applicable to a wide range of disciplines where similar sampling problems need to be faced, included but not limited to design of communication networks, optimal integration and communication of swarms of robots and drones, remote sensing.…”
-
77
Table_1_Computational prediction of promotors in Agrobacterium tumefaciens strain C58 by using the machine learning technique.DOCX
Published 2023“…These optimized features were inputted into a random forest (RF) classifier to discriminate promotor sequences from non-promotor sequences in A. tumefaciens strain C58. …”
-
78
Bayesian sequential design for sensitivity experiments with hybrid responses
Published 2023“…<p>In experimental design, a common problem seen in practice is when the result includes one binary response and multiple continuous responses. …”
-
79
Natural language processing for automated quantification of bone metastases reported in free-text bone scintigraphy reports
Published 2020“…The aim of this study was to develop a natural language processing (NLP) algorithm for binary classification (single metastasis versus two or more metastases) in bone scintigraphy reports of patients undergoing surgery for bone metastases.…”
-
80
Flowchart scheme of the ML-based model.
Published 2024“…<b>I)</b> Testing data consisting of 20% of the entire dataset. <b>J)</b> Optimization of hyperparameter tuning. <b>K)</b> Algorithm selection from all models. …”