يعرض 41 - 60 نتائج من 76 نتيجة بحث عن '(( binary based network optimization algorithm ) OR ( binary b common optimization algorithm ))*', وقت الاستعلام: 1.07s تنقيح النتائج
  1. 41

    Training losses for N = 10. حسب Hend Bayoumi (22693738)

    منشور في 2025
    "…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …"
  2. 42

    Normalized computation rate for N = 10. حسب Hend Bayoumi (22693738)

    منشور في 2025
    "…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …"
  3. 43

    Summary of Notations Used in this paper. حسب Hend Bayoumi (22693738)

    منشور في 2025
    "…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …"
  4. 44
  5. 45

    datasheet1_Graph Neural Networks for Maximum Constraint Satisfaction.pdf حسب Jan Tönshoff (10192709)

    منشور في 2021
    "…We introduce a graph neural network architecture for solving such optimization problems. …"
  6. 46

    SHAP bar plot. حسب Meng Cao (105914)

    منشور في 2025
    "…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …"
  7. 47

    Sample screening flowchart. حسب Meng Cao (105914)

    منشور في 2025
    "…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …"
  8. 48

    Descriptive statistics for variables. حسب Meng Cao (105914)

    منشور في 2025
    "…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …"
  9. 49

    SHAP summary plot. حسب Meng Cao (105914)

    منشور في 2025
    "…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …"
  10. 50

    ROC curves for the test set of four models. حسب Meng Cao (105914)

    منشور في 2025
    "…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …"
  11. 51

    Display of the web prediction interface. حسب Meng Cao (105914)

    منشور في 2025
    "…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …"
  12. 52

    Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment حسب Jianfang Cao (1881379)

    منشور في 2019
    "…<div><p>An image classification algorithm based on adaptive feature weight updating is proposed to address the low classification accuracy of the current single-feature classification algorithms and simple multifeature fusion algorithms. …"
  13. 53

    Data_Sheet_1_A real-time driver fatigue identification method based on GA-GRNN.ZIP حسب Xiaoyuan Wang (492534)

    منشور في 2022
    "…In this paper, a non-invasive and low-cost method of fatigue driving state identification based on genetic algorithm optimization of generalized regression neural network model is proposed. …"
  14. 54

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  15. 55

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  16. 56

    Comparison of intrusion detection systems. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  17. 57

    Parameter setting for CBOA and PSO. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  18. 58

    NSL-KDD dataset description. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  19. 59

    The architecture of LSTM cell. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  20. 60

    The architecture of ILSTM. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"