Search alternatives:
using optimization » joint optimization (Expand Search), design optimization (Expand Search), step optimization (Expand Search)
binary cases » binary values (Expand Search), binary labels (Expand Search), binary mask (Expand Search)
cases using » images using (Expand Search)
binary wave » binary image (Expand Search)
wave global » yale global (Expand Search), waqi global (Expand Search), based global (Expand Search)
using optimization » joint optimization (Expand Search), design optimization (Expand Search), step optimization (Expand Search)
binary cases » binary values (Expand Search), binary labels (Expand Search), binary mask (Expand Search)
cases using » images using (Expand Search)
binary wave » binary image (Expand Search)
wave global » yale global (Expand Search), waqi global (Expand Search), based global (Expand Search)
-
1
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
DataSheet1_Quantum-inspired optimization for wavelength assignment.PDF
Published 2023“…Playing a central role in modern telecommunications, this problem belongs to NP-complete class for a general case so that obtaining optimal solutions for industry-relevant cases is exponentially hard. …”
-
12
Supplementary Material for: Penalized Logistic Regression Analysis for Genetic Association Studies of Binary Phenotypes
Published 2022“…Introduction: Increasingly, logistic regression methods for genetic association studies of binary phenotypes must be able to accommodate data sparsity, which arises from unbalanced case-control ratios and/or rare genetic variants. …”
-
13
-
14
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
15
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
16
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
17
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
18
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
19
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
20
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”