Search alternatives:
process classification » protein classification (Expand Search), proposed classification (Expand Search), forest classification (Expand Search)
model optimization » codon optimization (Expand Search), global optimization (Expand Search), based optimization (Expand Search)
batch process » batch processing (Expand Search), search process (Expand Search), based process (Expand Search)
binary batch » binary data (Expand Search), final batch (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a model » _ model (Expand Search)
process classification » protein classification (Expand Search), proposed classification (Expand Search), forest classification (Expand Search)
model optimization » codon optimization (Expand Search), global optimization (Expand Search), based optimization (Expand Search)
batch process » batch processing (Expand Search), search process (Expand Search), based process (Expand Search)
binary batch » binary data (Expand Search), final batch (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a model » _ model (Expand Search)
-
121
P-value on CEC-2017(Dim = 30).
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
122
Memory storage behavior.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
123
Elite search behavior.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
124
Description of the datasets.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
125
S and V shaped transfer functions.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
126
S- and V-Type transfer function diagrams.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
127
Collaborative hunting behavior.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
128
Friedman average rank sum test results.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
129
IRBMO vs. variant comparison adaptation data.
Published 2025“…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …”
-
130
Flowchart scheme of the ML-based model.
Published 2024“…<b>I)</b> Testing data consisting of 20% of the entire dataset. <b>J)</b> Optimization of hyperparameter tuning. <b>K)</b> Algorithm selection from all models. …”
-
131
Analysis and design of algorithms for the manufacturing process of integrated circuits
Published 2023“…The (approximate) solution proposals of state-of-the-art methods include rule-based approaches, genetic algorithms, and reinforcement learning. There is a binary integer programming model for this problem in the literature, from which its authors proposed a genetic algorithm to obtain approximate solutions. …”
-
132
-
133
Unraveling Adsorbate-Induced Structural Evolution of Iron Carbide Nanoparticles
Published 2025“…For this purpose, we have developed a general procedure that we use to model an experimentally relevant 270-atom Fe<sub>182</sub>C<sub>88</sub> NP using the neural network-assisted stochastic surface walk global optimization algorithm (SSW-NN). …”
-
134
-
135
Generalized Tensor Decomposition With Features on Multiple Modes
Published 2021“…Our proposal handles a broad range of data types, including continuous, count, and binary observations. …”
-
136
Table_1_bSRWPSO-FKNN: A boosted PSO with fuzzy K-nearest neighbor classifier for predicting atopic dermatitis disease.docx
Published 2023“…</p>Methods<p>This paper establishes a medical prediction model for the first time on the basis of the enhanced particle swarm optimization (SRWPSO) algorithm and the fuzzy K-nearest neighbor (FKNN), called bSRWPSO-FKNN, which is practiced on a dataset related to patients with AD. …”
-
137
-
138
Algoritmo de detección de odio en español (Algorithm for detection of hate speech in Spanish)
Published 2024“…</li></ul><h2>Training Process</h2><h3>Pre-workout</h3><ul><li>Batch size: 16</li><li>Epochs: 5</li><li>Learning rate: 2e-5 with 10% warmup steps</li><li>Early stopping with patience=2</li></ul><h3>Fine-tuning</h3><ul><li>Batch size: 128</li><li>Epochs: 5</li><li>Learning rate: 2e-5 with 10% warmup steps</li><li>Early stopping with patience=2</li><li>Custom metrics:</li><li>Recall for non-hate class</li><li>Precision for hate class</li><li>F1-score (weighted)</li><li>AUC-PR</li><li>Recall at precision=0.9 (non-hate)</li><li>Precision at recall=0.9 (hate)</li></ul><h2>Evaluation Metrics</h2><p dir="ltr">The model is evaluated using:</p><ul><li>Macro recall, precision, and F1-score</li><li>One-vs-Rest AUC</li><li>Accuracy</li><li>Metrics by class</li><li>Confusion matrix</li></ul><h2>Requirements</h2><p dir="ltr">The following Python packages are required (see requirements.txt for the full list):</p><ul><li>TensorFlow</li><li>Transformers</li><li>scikit-learn</li><li>pandas</li><li>datasets</li><li>matplotlib</li><li>seaborn</li></ul><h2>Usage</h2><p dir="ltr">The model expects input data with the following specifications:</p><ol><li><b>Data Format</b>:</li></ol><ul><li>CSV file or Pandas DataFrame</li><li>Mandatory column name: <code>text</code> (type string)</li><li>Optional column name: <code>label</code> (type integer, 0 or 1) if available for evaluation</li></ul><ol><li><b>Text Preprocessing</b>:</li></ol><ul><li>Text will be automatically converted to lowercase during processing</li><li>Maximum length: 128 tokens (longer texts will be truncated)</li><li>Special characters, URLs, and emojis must remain in the text (the tokenizer handles these)</li></ul><ol><li><b>Label Encoding</b>:</li></ol><ul><li><code>0</code> = No hateful content (including neutral/positive content)</li><li>1 = Hate speech</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at:Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …”
-
139
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
140
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”