Search alternatives:
based optimization » whale optimization (Expand Search)
model optimization » codon optimization (Expand Search), global optimization (Expand Search), wolf optimization (Expand Search)
binary basic » binary mask (Expand Search)
basic based » music based (Expand Search), basic gases (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a model » _ model (Expand Search)
based optimization » whale optimization (Expand Search)
model optimization » codon optimization (Expand Search), global optimization (Expand Search), wolf optimization (Expand Search)
binary basic » binary mask (Expand Search)
basic based » music based (Expand Search), basic gases (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a model » _ model (Expand Search)
-
141
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
142
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
143
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
144
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
145
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
146
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
147
Testing results for classifying AD, MCI and NC.
Published 2024“…The model was trained and evaluated using a 10-fold cross-validation sampling approach with a learning rate of 0.001 and 200 training epochs at each instance. …”
-
148
Presentation_1_Modified GAN Augmentation Algorithms for the MRI-Classification of Myocardial Scar Tissue in Ischemic Cardiomyopathy.PPTX
Published 2021“…Currently, there are no optimized deep-learning algorithms for the automated classification of scarred vs. normal myocardium. …”
-
149
Table_1_An efficient decision support system for leukemia identification utilizing nature-inspired deep feature optimization.pdf
Published 2024“…To optimize feature selection, a customized binary Grey Wolf Algorithm is utilized, achieving an impressive 80% reduction in feature size while preserving key discriminative information. …”
-
150
Models and Dataset
Published 2025“…</p><p dir="ltr"><br></p><p dir="ltr"><b>TJO (Tom and Jerry Optimization):</b><br>TJO is a nature-inspired metaheuristic algorithm that models the predator-prey dynamics of the cartoon characters Tom (predator) and Jerry (prey). …”
-
151
Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish)
Published 2024“…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …”
-
152
Data_Sheet_1_A real-time driver fatigue identification method based on GA-GRNN.ZIP
Published 2022“…<p>It is of great practical and theoretical significance to identify driver fatigue state in real time and accurately and provide active safety warning in time. In this paper, a non-invasive and low-cost method of fatigue driving state identification based on genetic algorithm optimization of generalized regression neural network model is proposed. …”
-
153
Confusion matrix.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
154
Parameter settings.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
155
Event-driven data flow processing.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
156
Dynamic resource allocation process.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
157
Silibinin solubilization: combined effect of co-solvency and inclusion complex formation
Published 2024“…The solubility in PBS-ethanol mixtures followed a log-linear model. SLB solubility in the presence of the ethanol co-solvent and HP-β-CD complexing agent was optimized by adopting a genetic algorithm suggesting the phosphate buffer saline solution supplemented by 6%v/v ethanol and 8 mM HP-β-CD as an optimized medium. …”
-
158
Seed mix selection model
Published 2022“…</p> <p> </p> <p>We applied the seed mix selection model using a binary genetic algorithm to select seed mixes (R package ‘GA’; Scrucca 2013; Scrucca 2017). …”
-
159
Thesis-RAMIS-Figs_Slides
Published 2024“…Importantly, this strategy locates samples adaptively on the transition between facies which improves the performance of conventional \emph{<i>MPS</i>} algorithms. In conclusion, this work shows that preferential sampling can contribute in \emph{<i>MPS</i>} even at very small sampling regimes and, as a corollary, demonstrates that prior models (obtained form a training image) can be used effectively not only to simulate non-sensed variables of the field, but to decide where to measure next.…”
-
160
Table_1_Computational prediction of promotors in Agrobacterium tumefaciens strain C58 by using the machine learning technique.DOCX
Published 2023“…This study aimed to develop a machine learning-based model to predict promotors in Agrobacterium tumefaciens (A. tumefaciens) strain C58. …”