Search alternatives:
design optimization » bayesian optimization (Expand Search)
access optimization » process optimization (Expand Search), stress optimization (Expand Search), process optimisation (Expand Search)
primary data » primary care (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
case design » based design (Expand Search), game design (Expand Search), core design (Expand Search)
data access » data across (Expand Search), water access (Expand Search)
design optimization » bayesian optimization (Expand Search)
access optimization » process optimization (Expand Search), stress optimization (Expand Search), process optimisation (Expand Search)
primary data » primary care (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
case design » based design (Expand Search), game design (Expand Search), core design (Expand Search)
data access » data across (Expand Search), water access (Expand Search)
-
1
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
2
-
3
-
4
-
5
-
6
-
7
Comparative analysis of DDcGAN-GSOM’s True Positive Rate, False Alarm Rate, and Specificity.
Published 2025Subjects: -
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
Performance comparison of proposed system with state-of-the-art approaches.
Published 2025Subjects: -
18
-
19
-
20