Search alternatives:
guide optimization » guided optimization (Expand Search), driven optimization (Expand Search), whale optimization (Expand Search)
robust detection » object detection (Expand Search), point detection (Expand Search), first detection (Expand Search)
binary a » binary b (Expand Search), hilary a (Expand Search)
a guide » _ guide (Expand Search), may guide (Expand Search)
guide optimization » guided optimization (Expand Search), driven optimization (Expand Search), whale optimization (Expand Search)
robust detection » object detection (Expand Search), point detection (Expand Search), first detection (Expand Search)
binary a » binary b (Expand Search), hilary a (Expand Search)
a guide » _ guide (Expand Search), may guide (Expand Search)
-
1
The AD-PSO-Guided WOA LSTM framework.
Published 2025“…The capacity to confront and overcome this obstacle is where machine learning and metaheuristic algorithms shine. This study introduces the Adaptive Dynamic Particle Swarm Optimization enhanced with the Guided Whale Optimization Algorithm (AD-PSO-Guided WOA) for rainfall prediction. …”
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
Hyperparameters of the LSTM Model.
Published 2025“…The capacity to confront and overcome this obstacle is where machine learning and metaheuristic algorithms shine. This study introduces the Adaptive Dynamic Particle Swarm Optimization enhanced with the Guided Whale Optimization Algorithm (AD-PSO-Guided WOA) for rainfall prediction. …”
-
10
Prediction results of individual models.
Published 2025“…The capacity to confront and overcome this obstacle is where machine learning and metaheuristic algorithms shine. This study introduces the Adaptive Dynamic Particle Swarm Optimization enhanced with the Guided Whale Optimization Algorithm (AD-PSO-Guided WOA) for rainfall prediction. …”
-
11
The Pseudo-Code of the IRBMO Algorithm.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
12
-
13
IRBMO vs. meta-heuristic algorithms boxplot.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
14
IRBMO vs. feature selection algorithm boxplot.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
15
-
16
Related studies on IDS using deep learning.
Published 2024“…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …”
-
17
The architecture of the BI-LSTM model.
Published 2024“…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …”
-
18
Comparison of accuracy and DR on UNSW-NB15.
Published 2024“…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …”
-
19
Comparison of DR and FPR of UNSW-NB15.
Published 2024“…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …”
-
20