بدائل البحث:
design optimization » bayesian optimization (توسيع البحث)
policy optimization » topology optimization (توسيع البحث), wolf optimization (توسيع البحث), process optimization (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case design » based design (توسيع البحث), game design (توسيع البحث), core design (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
a policy » _ policy (توسيع البحث)
design optimization » bayesian optimization (توسيع البحث)
policy optimization » topology optimization (توسيع البحث), wolf optimization (توسيع البحث), process optimization (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case design » based design (توسيع البحث), game design (توسيع البحث), core design (توسيع البحث)
binary a » binary _ (توسيع البحث), binary b (توسيع البحث), hilary a (توسيع البحث)
a policy » _ policy (توسيع البحث)
-
1
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
2
-
3
-
4
-
5
-
6
-
7
-
8
Proposed Algorithm.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
9
-
10
-
11
Comparisons between ADAM and NADAM optimizers.
منشور في 2025"…This paper considers a wireless-powered MEC network employing a binary offloading policy, in which the computation tasks of MDs are either executed locally or fully offloaded to an edge server (ES). …"
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20