بدائل البحث:
model optimization » codon optimization (توسيع البحث), global optimization (توسيع البحث), based optimization (توسيع البحث)
immune process » immune processes (توسيع البحث)
binary immune » primary immune (توسيع البحث), binary image (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
a model » _ model (توسيع البحث)
model optimization » codon optimization (توسيع البحث), global optimization (توسيع البحث), based optimization (توسيع البحث)
immune process » immune processes (توسيع البحث)
binary immune » primary immune (توسيع البحث), binary image (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
a model » _ model (توسيع البحث)
-
121
Elite search behavior.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
122
Description of the datasets.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
123
S and V shaped transfer functions.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
124
S- and V-Type transfer function diagrams.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
125
Collaborative hunting behavior.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
126
Friedman average rank sum test results.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
127
IRBMO vs. variant comparison adaptation data.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
-
128
Flowchart scheme of the ML-based model.
منشور في 2024"…<b>I)</b> Testing data consisting of 20% of the entire dataset. <b>J)</b> Optimization of hyperparameter tuning. <b>K)</b> Algorithm selection from all models. …"
-
129
Analysis and design of algorithms for the manufacturing process of integrated circuits
منشور في 2023"…The (approximate) solution proposals of state-of-the-art methods include rule-based approaches, genetic algorithms, and reinforcement learning. There is a binary integer programming model for this problem in the literature, from which its authors proposed a genetic algorithm to obtain approximate solutions. …"
-
130
-
131
Unraveling Adsorbate-Induced Structural Evolution of Iron Carbide Nanoparticles
منشور في 2025"…For this purpose, we have developed a general procedure that we use to model an experimentally relevant 270-atom Fe<sub>182</sub>C<sub>88</sub> NP using the neural network-assisted stochastic surface walk global optimization algorithm (SSW-NN). …"
-
132
-
133
Generalized Tensor Decomposition With Features on Multiple Modes
منشور في 2021"…Our proposal handles a broad range of data types, including continuous, count, and binary observations. …"
-
134
Table_1_bSRWPSO-FKNN: A boosted PSO with fuzzy K-nearest neighbor classifier for predicting atopic dermatitis disease.docx
منشور في 2023"…</p>Methods<p>This paper establishes a medical prediction model for the first time on the basis of the enhanced particle swarm optimization (SRWPSO) algorithm and the fuzzy K-nearest neighbor (FKNN), called bSRWPSO-FKNN, which is practiced on a dataset related to patients with AD. …"
-
135
-
136
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
137
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
138
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
139
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
140
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"