Search alternatives:
process optimization » model optimization (Expand Search)
network optimization » swarm optimization (Expand Search), wolf optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
a process » _ process (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
process optimization » model optimization (Expand Search)
network optimization » swarm optimization (Expand Search), wolf optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
a process » _ process (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
-
81
Processed dataset to train and test the WGAN-GP_IMOA_DA_Ensemble model
Published 2025“…This framework integrates a novel biologically inspired optimization algorithm, the Indian Millipede Optimization Algorithm (IMOA), for effective feature selection. …”
-
82
Dynamic resource allocation process.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
83
SHAP bar plot.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
84
Sample screening flowchart.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
85
Descriptive statistics for variables.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
86
SHAP summary plot.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
87
ROC curves for the test set of four models.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
88
Display of the web prediction interface.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
89
Event-driven data flow processing.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
90
-
91
-
92
Data_Sheet_1_A real-time driver fatigue identification method based on GA-GRNN.ZIP
Published 2022“…In this paper, a non-invasive and low-cost method of fatigue driving state identification based on genetic algorithm optimization of generalized regression neural network model is proposed. …”
-
93
Design and implementation of the Multiple Criteria Decision Making (MCDM) algorithm for predicting the severity of COVID-19.
Published 2021“…<p>(A). The MCDM algorithm-Stage 1. Preprocessing, this stage is the process of refining the collected raw data to eliminate noise, including correlation analysis and feature selection based on P values. …”
-
94
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
95
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
96
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
97
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
98
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
99
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
100
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”