بدائل البحث:
based optimization » whale optimization (توسيع البحث)
small optimization » swarm optimization (توسيع البحث), whale optimization (توسيع البحث), spatial optimization (توسيع البحث)
binary cases » binary values (توسيع البحث), binary labels (توسيع البحث), binary mask (توسيع البحث)
binary based » library based (توسيع البحث), linac based (توسيع البحث), binary mask (توسيع البحث)
cases based » case based (توسيع البحث), scores based (توسيع البحث), values based (توسيع البحث)
based small » based smart (توسيع البحث), based sample (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
small optimization » swarm optimization (توسيع البحث), whale optimization (توسيع البحث), spatial optimization (توسيع البحث)
binary cases » binary values (توسيع البحث), binary labels (توسيع البحث), binary mask (توسيع البحث)
binary based » library based (توسيع البحث), linac based (توسيع البحث), binary mask (توسيع البحث)
cases based » case based (توسيع البحث), scores based (توسيع البحث), values based (توسيع البحث)
based small » based smart (توسيع البحث), based sample (توسيع البحث)
-
1
-
2
-
3
-
4
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
Datasets and their properties.
منشور في 2023"…In addition, we designed nested transfer (NT) functions and investigated the influence of the function on the level-1 optimizer. The binary Ebola optimization search algorithm (BEOSA) is applied for the level-1 mutation, while the simulated annealing (SA) and firefly (FFA) algorithms are investigated for the level-2 optimizer. …"
-
16
Parameter settings.
منشور في 2023"…In addition, we designed nested transfer (NT) functions and investigated the influence of the function on the level-1 optimizer. The binary Ebola optimization search algorithm (BEOSA) is applied for the level-1 mutation, while the simulated annealing (SA) and firefly (FFA) algorithms are investigated for the level-2 optimizer. …"
-
17
-
18
-
19
-
20
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"