Search alternatives:
process optimization » model optimization (Expand Search)
case optimization » based optimization (Expand Search), phase optimization (Expand Search), dose optimization (Expand Search)
while process » whole process (Expand Search), cycle process (Expand Search), like process (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based case » base case (Expand Search), based cancer (Expand Search)
process optimization » model optimization (Expand Search)
case optimization » based optimization (Expand Search), phase optimization (Expand Search), dose optimization (Expand Search)
while process » whole process (Expand Search), cycle process (Expand Search), like process (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based case » base case (Expand Search), based cancer (Expand Search)
-
1
-
2
-
3
-
4
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
5
Optimized process of the random forest algorithm.
Published 2023“…Specific coal mine case studies are conducted to verify the applicability of the optimized random forest algorithm. The experimental results demonstrate that: The optimized random forest model has achieved 100% accuracy in predicting gas explosion disaster of coal mines, while the accuracy of SVM model is only 75%. …”
-
6
-
7
-
8
The details of the test algorithm.
Published 2023“…Five state-of-the-art evolutionary algorithms are used in the control group. Finally, experimental results demonstrate that the DMBBPSO can provide high precision results for single-objective optimization problems.…”
-
9
-
10
-
11
-
12
-
13
Schematic diagram of feature template extraction.
Published 2025“…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
-
14
HE_FaceNet error rate.
Published 2025“…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
-
15
Flow chart of system ciphertext clustering.
Published 2025“…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
-
16
HE_FaceNet frame diagram.
Published 2025“…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
-
17
Improved random forest algorithm.
Published 2025“…Additionally, considering the imbalanced in population spatial distribution, we used the K-means ++ clustering algorithm to cluster the optimal feature subset, and we used the bootstrap sampling method to extract the same amount of data from each cluster and fuse it with the training subset to build an improved random forest model. …”
-
18
K-means++ clustering algorithm.
Published 2025“…Additionally, considering the imbalanced in population spatial distribution, we used the K-means ++ clustering algorithm to cluster the optimal feature subset, and we used the bootstrap sampling method to extract the same amount of data from each cluster and fuse it with the training subset to build an improved random forest model. …”
-
19
-
20
GA process.
Published 2025“…Genetic algorithm is utilized to solve and optimize the data, one-dimensional multi-scale convolutional neural network is combined with gated recurrent unit to improve the network intrusion detection model, and finally the detection and defense of industrial control network intrusion is completed. …”