بدائل البحث:
phase optimization » whale optimization (توسيع البحث), based optimization (توسيع البحث), path optimization (توسيع البحث)
acid optimization » based optimization (توسيع البحث), lead optimization (توسيع البحث), art optimization (توسيع البحث)
binary based » library based (توسيع البحث), linac based (توسيع البحث), binary mask (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case phase » gas phase (توسيع البحث), late phase (توسيع البحث), game phase (توسيع البحث)
based acid » based bci (توسيع البحث), based ai (توسيع البحث), based agi (توسيع البحث)
phase optimization » whale optimization (توسيع البحث), based optimization (توسيع البحث), path optimization (توسيع البحث)
acid optimization » based optimization (توسيع البحث), lead optimization (توسيع البحث), art optimization (توسيع البحث)
binary based » library based (توسيع البحث), linac based (توسيع البحث), binary mask (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case phase » gas phase (توسيع البحث), late phase (توسيع البحث), game phase (توسيع البحث)
based acid » based bci (توسيع البحث), based ai (توسيع البحث), based agi (توسيع البحث)
-
1
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
2
-
3
-
4
Python-Based Algorithm for Estimating NRTL Model Parameters with UNIFAC Model Simulation Results
منشور في 2025الموضوعات: -
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
17
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
18
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
19
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
20
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"