Search alternatives:
detection optimization » reaction optimization (Expand Search), generation optimization (Expand Search), distortion optimization (Expand Search)
all optimization » art optimization (Expand Search), ai optimization (Expand Search), whale optimization (Expand Search)
based detection » case detection (Expand Search), rapid detection (Expand Search), cancer detection (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
lines based » lens based (Expand Search), genes based (Expand Search), lines used (Expand Search)
based all » based small (Expand Search), based cell (Expand Search), based ap (Expand Search)
detection optimization » reaction optimization (Expand Search), generation optimization (Expand Search), distortion optimization (Expand Search)
all optimization » art optimization (Expand Search), ai optimization (Expand Search), whale optimization (Expand Search)
based detection » case detection (Expand Search), rapid detection (Expand Search), cancer detection (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
lines based » lens based (Expand Search), genes based (Expand Search), lines used (Expand Search)
based all » based small (Expand Search), based cell (Expand Search), based ap (Expand Search)
-
1
-
2
-
3
-
4
MSE for ILSTM algorithm in binary classification.
Published 2023“…In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. …”
-
5
-
6
-
7
-
8
-
9
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20