يعرض 101 - 120 نتائج من 218 نتيجة بحث عن '(( binary based process optimization algorithm ) OR ( binary 2 model optimization algorithm ))', وقت الاستعلام: 0.42s تنقيح النتائج
  1. 101
  2. 102
  3. 103
  4. 104

    Pseudo Code of RBMO. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  5. 105

    P-value on CEC-2017(Dim = 30). حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  6. 106

    Memory storage behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  7. 107

    Elite search behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  8. 108

    Description of the datasets. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  9. 109

    S and V shaped transfer functions. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  10. 110

    S- and V-Type transfer function diagrams. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  11. 111

    Collaborative hunting behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  12. 112

    Friedman average rank sum test results. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  13. 113

    IRBMO vs. variant comparison adaptation data. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
  14. 114

    Parameter settings. حسب Yang Cao (53545)

    منشور في 2024
    "…<div><p>Differential Evolution (DE) is widely recognized as a highly effective evolutionary algorithm for global optimization. It has proven its efficacy in tackling diverse problems across various fields and real-world applications. …"
  15. 115

    MCLP_quantum_annealer_V0.5 حسب Anonymous Anonymous (4854526)

    منشور في 2025
    "…Theoretical and applied experiments are conducted using four solvers: QBSolv, D-Wave Hybrid binary quadratic model 2, D-Wave Advantage system 4.1, and Gurobi. …"
  16. 116
  17. 117
  18. 118
  19. 119

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  20. 120

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"