Search alternatives:
structure generation » structure interaction (Expand Search), structure annotation (Expand Search), structure selection (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), selection algorithm (Expand Search)
based optimization » whale optimization (Expand Search)
binary cases » binary values (Expand Search), binary labels (Expand Search), binary mask (Expand Search)
a structure » _ structure (Expand Search), age structure (Expand Search), rna structure (Expand Search)
cases based » case based (Expand Search), scores based (Expand Search), values based (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
structure generation » structure interaction (Expand Search), structure annotation (Expand Search), structure selection (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), selection algorithm (Expand Search)
based optimization » whale optimization (Expand Search)
binary cases » binary values (Expand Search), binary labels (Expand Search), binary mask (Expand Search)
a structure » _ structure (Expand Search), age structure (Expand Search), rna structure (Expand Search)
cases based » case based (Expand Search), scores based (Expand Search), values based (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
-
1
-
2
-
3
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
4
-
5
A Set of Efficient Methods to Generate High-Dimensional Binary Data With Specified Correlation Structures
Published 2021“…In this article, we introduce several computationally efficient algorithms that generate high-dimensional binary data with specified correlation structures and unequal probabilities. …”
-
6
Analysis and design of algorithms for the manufacturing process of integrated circuits
Published 2023“…Based on this new representation, we proposed and evaluated other approximate methods, including a greedy algorithm and a genetic algorithm that improve the state-of-the-art results for test cases usually used in the literature. …”
-
7
-
8
Hair removal preprocessing using the DullRazor algorithm before image generation.
Published 2025“…<p>The DullRazor algorithm systematically removes hair artifacts through a multi-step process: (1) converting the original hairy input image to grayscale, (2) applying a black hat filter to detect and isolate hair structures, (3) creating a binary mask of detected hair regions, and (4) removing hair regions and inpainting the underlying skin texture. …”
-
9
-
10
-
11
Data_Sheet_1_Posiform planting: generating QUBO instances for benchmarking.pdf
Published 2023“…While brute forcing smaller instances is possible, such instances are typically not interesting due to being too easy for both quantum and classical algorithms. In this contribution, we propose a novel method, called posiform planting, for generating random QUBO instances of arbitrary size with known optimal solutions, and use those instances to benchmark the sampling quality of four D-Wave quantum annealers utilizing different interconnection structures (Chimera, Pegasus, and Zephyr hardware graphs) and the simulated annealing algorithm. …”
-
12
-
13
-
14
BCN-M: A Free Computational Tool for Generating Wulff-like Nanoparticle Models with Controlled Stoichiometry
Published 2019“…BCN-M has been applied to 15 different materials, leading to a variety of models that cover the most relevant binary ionic structures and symmetries (cubic, tetragonal, hexagonal, and monoclinic). …”
-
15
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
Published 2025“…The performance of the proposed LEGAN-BEPO-BCMANET technique attains 29.786%, 19.25%, 22.93%, 27.21%, 31.02%, 26.91%, and 25.61% greater throughput, compared to existing methods like Blockchain-based BATMAN protocol utilizing MANET with an ensemble algorithm (BATMAN-MANET), Block chain-based trusted distributed routing scheme with optimized dropout ensemble extreme learning neural network in MANET (DEELNN-MANET), A secured trusted routing utilizing structure of a new directed acyclic graph-blockchain in MANET internet of things environment (DAG-MANET), An Optimized Link State Routing Protocol with Blockchain Framework for Efficient Video-Packet Transmission and Security over MANET (OLSRP-MANET), Auto-metric Graph Neural Network based Blockchain Technology for Protected Dynamic Optimum Routing in MANET (AGNN-MANET) and Data security-based routing in MANETs under key management process (DSR-MANET) respectively.…”
-
16
-
17
-
18
-
19
-
20