Search alternatives:
case optimization » based optimization (Expand Search), phase optimization (Expand Search), dose optimization (Expand Search)
based objective » based object (Expand Search), based selective (Expand Search), based objects (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based case » base case (Expand Search), based cancer (Expand Search)
case optimization » based optimization (Expand Search), phase optimization (Expand Search), dose optimization (Expand Search)
based objective » based object (Expand Search), based selective (Expand Search), based objects (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based case » base case (Expand Search), based cancer (Expand Search)
-
21
Simulation parameters.
Published 2025“…The objective is to optimize binary offloading decisions under dynamic wireless channel conditions and energy harvesting constraints. …”
-
22
Training losses for N = 10.
Published 2025“…The objective is to optimize binary offloading decisions under dynamic wireless channel conditions and energy harvesting constraints. …”
-
23
Normalized computation rate for N = 10.
Published 2025“…The objective is to optimize binary offloading decisions under dynamic wireless channel conditions and energy harvesting constraints. …”
-
24
Summary of Notations Used in this paper.
Published 2025“…The objective is to optimize binary offloading decisions under dynamic wireless channel conditions and energy harvesting constraints. …”
-
25
A new fast filtering algorithm for a 3D point cloud based on RGB-D information
Published 2019“…This method aligns the color image to the depth image, and the color mapping image is converted to an HSV image. Then, the optimal segmentation threshold of the V image that is calculated by using the Otsu algorithm is applied to segment the color mapping image into a binary image, which is used to extract the valid point cloud from the original point cloud with outliers. …”
-
26
-
27
-
28
-
29
Data Sheet 1_Detection of litchi fruit maturity states based on unmanned aerial vehicle remote sensing and improved YOLOv8 model.docx
Published 2025“…In addition, YOLOv8-FPDW was more competitive than mainstream object detection algorithms. The study predicted the optimal harvest period for litchis, providing scientific support for orchard batch harvesting and fine management.…”
-
30
-
31
-
32
-
33
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
34
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
35
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
36
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
37
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
38
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
39
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
40
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”