Search alternatives:
bayesian optimization » based optimization (Expand Search)
false detection » case detection (Expand Search), based detection (Expand Search), cancer detection (Expand Search)
data bayesian » a bayesian (Expand Search), art bayesian (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based false » based case (Expand Search), based pulse (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
bayesian optimization » based optimization (Expand Search)
false detection » case detection (Expand Search), based detection (Expand Search), cancer detection (Expand Search)
data bayesian » a bayesian (Expand Search), art bayesian (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based false » based case (Expand Search), based pulse (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
-
1
-
2
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…This research presents Data-Driven Intrusion Detection System in Internet of Things utilizing Optimized Bayesian Regularization-Back Propagation Neural Network (DIDS-BRBPNN-BBWOA-IoT) to overcome these issues. …”
-
3
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
4
Joint Detection of Change Points in Multichannel Single-Molecule Measurements
Published 2021“…We validate the algorithm on simulated data and characterize the power of detection and false positive rate. …”
-
5
Detection and Analysis of Nodule in Mammographic images using false positive reduction Detection Technique
Published 2022“…<p>This article analyzes several methods for reducing false positive results in</p> <p>mammography mass detection. …”
-
6
-
7
Bayesian sequential design for sensitivity experiments with hybrid responses
Published 2023“…To deal with the problem of complex computation involved in searching for optimal designs, fast algorithms are presented using two strategies to approximate the optimal criterion, denoted as SI-optimal design and Bayesian D-optimal design, respectively. …”
-
8
-
9
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
10
AUPRC of the ML models.
Published 2023“…</p><p>Methods</p><p>Machine learning algorithms such as Random Forest, Support Vector Machine, Logistic Regression and K-Nearest Neighbours were used to train insect true and false pre-microRNA features with 10-fold Cross Validation on SMOTE and Near-Miss datasets. miRNA targets IDs were collected from miRTarbase and their corresponding transcripts were collected from FlyBase. …”
-
11
Table_2_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
12
Table_3_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
13
Table_1_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
14
DataSheet_1_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
15
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
16
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
17
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
18
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
19
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
20
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”