Search alternatives:
detection optimization » reaction optimization (Expand Search), generation optimization (Expand Search), distortion optimization (Expand Search)
after optimization » based optimization (Expand Search), model optimization (Expand Search), path optimization (Expand Search)
based detection » case detection (Expand Search), rapid detection (Expand Search), cancer detection (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
lines based » lens based (Expand Search), genes based (Expand Search), lines used (Expand Search)
based after » based water (Expand Search), named after (Expand Search), cases after (Expand Search)
detection optimization » reaction optimization (Expand Search), generation optimization (Expand Search), distortion optimization (Expand Search)
after optimization » based optimization (Expand Search), model optimization (Expand Search), path optimization (Expand Search)
based detection » case detection (Expand Search), rapid detection (Expand Search), cancer detection (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
lines based » lens based (Expand Search), genes based (Expand Search), lines used (Expand Search)
based after » based water (Expand Search), named after (Expand Search), cases after (Expand Search)
-
1
-
2
-
3
-
4
MSE for ILSTM algorithm in binary classification.
Published 2023“…In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. …”
-
5
-
6
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
7
-
8
-
9
Comparative discussion based on routing.
Published 2023“…<div><p>In the pandemic of COVID-19 patients approach to the hospital for prescription, yet due to extreme line up the patient gets treatment after waiting for more than one hour. …”
-
10
-
11
-
12
Buffer allocation problem in production flow lines: A new Benders-decomposition-based exact solution approach
Published 2021“…The algorithm iterates between a simulation module that generates the Benders cuts and an optimization module that involves the solution of an updated MILP model. …”
-
13
-
14
-
15
-
16
-
17
-
18
Comparison of intrusion detection systems.
Published 2023“…In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. …”
-
19
A* Path-Finding Algorithm to Determine Cell Connections
Published 2025“…To address this, the research integrates a modified A* pathfinding algorithm with a U-Net convolutional neural network, a custom statistical binary classification method, and a personalized Min-Max connectivity threshold to automate the detection of astrocyte connectivity.…”
-
20