Showing 1 - 20 results of 25 for search '(( binary based false detection algorithm ) OR ( binary data bayesian optimization algorithm ))', query time: 0.49s Refine Results
  1. 1
  2. 2

    Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things by Ashok Kumar K (21441108)

    Published 2025
    “…This research presents Data-Driven Intrusion Detection System in Internet of Things utilizing Optimized Bayesian Regularization-Back Propagation Neural Network (DIDS-BRBPNN-BBWOA-IoT) to overcome these issues. …”
  3. 3

    MSE for ILSTM algorithm in binary classification. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  4. 4

    Joint Detection of Change Points in Multichannel Single-Molecule Measurements by Hugh Wilson (11797444)

    Published 2021
    “…We validate the algorithm on simulated data and characterize the power of detection and false positive rate. …”
  5. 5

    Detection and Analysis of Nodule in Mammographic images using false positive reduction Detection Technique by Dr.E.N. Ganesh (12315038)

    Published 2022
    “…<p>This article analyzes several methods for reducing false positive results in</p> <p>mammography mass detection. …”
  6. 6
  7. 7

    Bayesian sequential design for sensitivity experiments with hybrid responses by Yuxia Liu (1779592)

    Published 2023
    “…To deal with the problem of complex computation involved in searching for optimal designs, fast algorithms are presented using two strategies to approximate the optimal criterion, denoted as SI-optimal design and Bayesian D-optimal design, respectively. …”
  8. 8
  9. 9

    Comparison of intrusion detection systems. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  10. 10

    AUPRC of the ML models. by Adhiraj Nath (17118269)

    Published 2023
    “…</p><p>Methods</p><p>Machine learning algorithms such as Random Forest, Support Vector Machine, Logistic Regression and K-Nearest Neighbours were used to train insect true and false pre-microRNA features with 10-fold Cross Validation on SMOTE and Near-Miss datasets. miRNA targets IDs were collected from miRTarbase and their corresponding transcripts were collected from FlyBase. …”
  11. 11

    Table_2_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf by Silvy M. van Kuijk (16881867)

    Published 2023
    “…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
  12. 12

    Table_3_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf by Silvy M. van Kuijk (16881867)

    Published 2023
    “…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
  13. 13

    Table_1_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf by Silvy M. van Kuijk (16881867)

    Published 2023
    “…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
  14. 14

    DataSheet_1_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf by Silvy M. van Kuijk (16881867)

    Published 2023
    “…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
  15. 15

    Summary of LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  16. 16

    SHAP analysis for LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  17. 17

    Parameter setting for CBOA and PSO. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  18. 18

    NSL-KDD dataset description. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  19. 19

    The architecture of LSTM cell. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
  20. 20

    The architecture of ILSTM. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”