يعرض 21 - 40 نتائج من 55 نتيجة بحث عن '(( binary class acid optimization algorithm ) OR ( binary class a optimization algorithm ))', وقت الاستعلام: 0.44s تنقيح النتائج
  1. 21
  2. 22
  3. 23

    <i>hi</i>PRS algorithm process flow. حسب Michela C. Massi (14599915)

    منشور في 2023
    "…<b>(B)</b> Focusing on the positive class only, the algorithm exploits FIM (<i>apriori</i> algorithm) to build a list of candidate interactions of any desired order, retaining those that have an empirical frequency above a given threshold <i>δ</i>. …"
  4. 24
  5. 25
  6. 26

    DataSheet1_Quantum-inspired optimization for wavelength assignment.PDF حسب Aleksey S. Boev (14441805)

    منشور في 2023
    "…Playing a central role in modern telecommunications, this problem belongs to NP-complete class for a general case so that obtaining optimal solutions for industry-relevant cases is exponentially hard. …"
  7. 27

    Testing results for classifying AD, MCI and NC. حسب Nicodemus Songose Awarayi (18414494)

    منشور في 2024
    "…<div><p>This study aims to develop an optimally performing convolutional neural network to classify Alzheimer’s disease into mild cognitive impairment, normal controls, or Alzheimer’s disease classes using a magnetic resonance imaging dataset. …"
  8. 28

    Summary of existing CNN models. حسب Nicodemus Songose Awarayi (18414494)

    منشور في 2024
    "…<div><p>This study aims to develop an optimally performing convolutional neural network to classify Alzheimer’s disease into mild cognitive impairment, normal controls, or Alzheimer’s disease classes using a magnetic resonance imaging dataset. …"
  9. 29

    Supplementary Material for: Penalized Logistic Regression Analysis for Genetic Association Studies of Binary Phenotypes حسب Yu Y. (3096192)

    منشور في 2022
    "…We consider two approximate approaches to maximizing the marginal likelihood: (i) a Monte Carlo EM algorithm (MCEM) and (ii) a Laplace approximation (LA) to each integral, followed by derivative-free optimization of the approximation. …"
  10. 30

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  11. 31

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  12. 32

    Comparison of intrusion detection systems. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  13. 33

    Parameter setting for CBOA and PSO. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  14. 34

    NSL-KDD dataset description. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  15. 35

    The architecture of LSTM cell. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  16. 36

    The architecture of ILSTM. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  17. 37

    Parameter setting for LSTM. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  18. 38

    LITNET-2020 data splitting approach. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  19. 39

    Transformation of symbolic features in NSL-KDD. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  20. 40

    Programs to evaluate superoptimizer STOKE. حسب Przemysław Kowalewski (12893507)

    منشور في 2022
    "…<p>STOKE is one of the Superoptimizers which are programs that given a function and a set of instructions of a processor, traverse through a space of programs that compute a given function and try to find the optimal usually in terms of execution speed or size of the binary. …"