Showing 21 - 40 results of 40 for search '(( binary case based optimization algorithm ) OR ( primary data code optimization algorithm ))', query time: 0.58s Refine Results
  1. 21

    ECE6379_PSOM.zip by Xingpeng Li (11825663)

    Published 2021
    “…Optimization algorithms that are commonly used to solve these problems will also be covered including linear programming, mixed-integer linear programming, Lagrange relaxation, dynamic programming, branch and bound, and duality theory.…”
  2. 22

    Summary of LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  3. 23

    SHAP analysis for LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  4. 24

    Comparison of intrusion detection systems. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  5. 25

    Parameter setting for CBOA and PSO. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  6. 26

    NSL-KDD dataset description. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  7. 27

    The architecture of LSTM cell. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  8. 28

    The architecture of ILSTM. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  9. 29

    Parameter setting for LSTM. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  10. 30

    LITNET-2020 data splitting approach. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  11. 31

    Transformation of symbolic features in NSL-KDD. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  12. 32
  13. 33

    Data_Sheet_1_Multiclass Classification Based on Combined Motor Imageries.pdf by Cecilia Lindig-León (7889777)

    Published 2020
    “…And we propose two new multilabel uses of the Common Spatial Pattern (CSP) algorithm to optimize the signal-to-noise ratio, namely MC2CMI and MC2SMI approaches. …”
  14. 34
  15. 35

    DataSheet_1_Multi-Parametric MRI-Based Radiomics Models for Predicting Molecular Subtype and Androgen Receptor Expression in Breast Cancer.docx by Yuhong Huang (115702)

    Published 2021
    “…We applied several feature selection strategies including the least absolute shrinkage and selection operator (LASSO), and recursive feature elimination (RFE), the maximum relevance minimum redundancy (mRMR), Boruta and Pearson correlation analysis, to select the most optimal features. We then built 120 diagnostic models using distinct classification algorithms and feature sets divided by MRI sequences and selection strategies to predict molecular subtype and AR expression of breast cancer in the testing dataset of leave-one-out cross-validation (LOOCV). …”
  16. 36

    IUTF Dataset(Enhanced): Enabling Cross-Border Resource for Analysing the Impact of Rainfall on Urban Transportation Systems by Xuhui Lin (19505503)

    Published 2025
    “…</p><p dir="ltr"><b>Quality Assurance</b>: Comprehensive technical validation demonstrates the dataset's integrity, sensitivity to rainfall impacts, and capability to reveal complex traffic-weather interaction patterns.</p><h2>Data Structure</h2><p dir="ltr">The dataset is organized into four primary components:</p><ol><li><b>Road Network Data</b>: Topological representations including spatial geometry, functional classification, and connectivity information</li><li><b>Traffic Sensor Data</b>: Sensor metadata, locations, and measurements at both 5-minute and hourly resolutions</li><li><b>Precipitation Data</b>: Hourly meteorological information with spatial grid cell metadata</li><li><b>Derived Analytical Matrices</b>: Pre-computed structures for advanced spatial-temporal modelling and network analyses</li></ol><h2>File Formats</h2><ul><li><b>Tabular Data</b>: Apache Parquet format for optimal compression and fast query performance</li><li><b>Numerical Matrices</b>: NumPy NPZ format for efficient scientific computing</li><li><b>Total Size</b>: Approximately 2 GB uncompressed</li></ul><h2>Applications</h2><p dir="ltr">The IUTF dataset enables diverse analytical applications including:</p><ul><li><b>Traffic Flow Prediction</b>: Developing weather-aware traffic forecasting models</li><li><b>Infrastructure Planning</b>: Identifying vulnerable network components and prioritizing investments</li><li><b>Resilience Assessment</b>: Quantifying system recovery curves, robustness metrics, and adaptive capacity</li><li><b>Climate Adaptation</b>: Supporting evidence-based transportation planning under changing precipitation patterns</li><li><b>Emergency Management</b>: Improving response strategies for weather-related traffic disruptions</li></ul><h2>Methodology</h2><p dir="ltr">The dataset creation involved three main stages:</p><ol><li><b>Data Collection</b>: Sourcing traffic data from UTD19, road networks from OpenStreetMap, and precipitation data from ERA5 reanalysis</li><li><b>Spatio-Temporal Harmonization</b>: Comprehensive integration using novel algorithms for spatial alignment and temporal synchronization</li><li><b>Quality Assurance</b>: Rigorous validation and technical verification across all cities and data components</li></ol><h2>Code Availability</h2><p dir="ltr">Processing code is available at: https://github.com/viviRG2024/IUTDF_processing</p>…”
  17. 37
  18. 38

    CSPP instance by peixiang wang (19499344)

    Published 2025
    “…</b></p><p dir="ltr">Its primary function is to create structured datasets that simulate container terminal operations, which can then be used for developing, testing, and benchmarking optimization algorithms (e.g., for yard stacking strategies, vessel stowage planning).…”
  19. 39

    Data_Sheet_1_Alzheimer’s Disease Diagnosis and Biomarker Analysis Using Resting-State Functional MRI Functional Brain Network With Multi-Measures Features and Hippocampal Subfield... by Uttam Khatri (12689072)

    Published 2022
    “…Finally, we implemented and compared the different feature selection algorithms to integrate the structural features, brain networks, and voxel features to optimize the diagnostic identifications of AD using support vector machine (SVM) classifiers. …”
  20. 40

    Supplementary file 1_A real-world disproportionality analysis of FDA adverse event reporting system (FAERS) events for lecanemab.docx by Linlin Yan (4480570)

    Published 2025
    “…Using the Reporting Odds Ratio (ROR), Proportional Reporting Ratio (PRR), Bayesian Confidence Propagation Neural Network (BCPNN), and Multi-item Gamma Poisson Shrinker (MGPS) algorithms, we conducted a comprehensive analysis of lecanemab-related AEs, restricting the analysis to AEs with the role code of primary suspect (PS).…”