Search alternatives:
network optimization » swarm optimization (Expand Search), wolf optimization (Expand Search)
all optimization » art optimization (Expand Search), ai optimization (Expand Search), whale optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based all » based small (Expand Search), based cell (Expand Search), based ap (Expand Search)
network optimization » swarm optimization (Expand Search), wolf optimization (Expand Search)
all optimization » art optimization (Expand Search), ai optimization (Expand Search), whale optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based all » based small (Expand Search), based cell (Expand Search), based ap (Expand Search)
-
1
-
2
-
3
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
4
-
5
-
6
SHAP bar plot.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
7
Sample screening flowchart.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
8
Descriptive statistics for variables.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
9
SHAP summary plot.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
10
ROC curves for the test set of four models.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
11
Display of the web prediction interface.
Published 2025“…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
-
12
DE algorithm flow.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
13
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
14
Test results of different algorithms.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
15
Proposed Algorithm.
Published 2025“…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …”
-
16
Comparisons between ADAM and NADAM optimizers.
Published 2025“…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …”
-
17
Algorithm for generating hyperparameter.
Published 2024“…The results obtained show that the proposed model has superior prediction accuracy in comparison to its counterparts. Moreover, among all the hyperparameter-optimized algorithms, adaboost algorithm outperformed all the other hyperparameter-optimized algorithms. …”
-
18
Results of machine learning algorithm.
Published 2024“…The results obtained show that the proposed model has superior prediction accuracy in comparison to its counterparts. Moreover, among all the hyperparameter-optimized algorithms, adaboost algorithm outperformed all the other hyperparameter-optimized algorithms. …”
-
19
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
Published 2025“…To tackle these challenges, this paper proposes the Blockchain Based Trusted Distributed Routing Scheme for MANET using Latent Encoder Coupled Generative Adversarial Network Optimized with Binary Emperor Penguin Optimizer (LEGAN-BEPO-BCMANET). …”
-
20
ROC comparison of machine learning algorithm.
Published 2024“…The results obtained show that the proposed model has superior prediction accuracy in comparison to its counterparts. Moreover, among all the hyperparameter-optimized algorithms, adaboost algorithm outperformed all the other hyperparameter-optimized algorithms. …”