Search alternatives:
network optimization » swarm optimization (Expand Search), wolf optimization (Expand Search)
driven optimization » design optimization (Expand Search), guided optimization (Expand Search), dose optimization (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
less based » lens based (Expand Search), lemos based (Expand Search), degs based (Expand Search)
network optimization » swarm optimization (Expand Search), wolf optimization (Expand Search)
driven optimization » design optimization (Expand Search), guided optimization (Expand Search), dose optimization (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
less based » lens based (Expand Search), lemos based (Expand Search), degs based (Expand Search)
-
81
-
82
Example of distance matrices generated by the IGTD in the process of conversion.
Published 2023Subjects: -
83
-
84
-
85
-
86
-
87
-
88
-
89
-
90
-
91
Testing accuracy and performance metrics for different DTL models for every class.
Published 2024Subjects: -
92
-
93
-
94
-
95
Random sample of dataset image with the testing accuracy for every image with different classes.
Published 2024Subjects: -
96
The consumed time for Resnet50 and DeepDate model for (a) FS and training and (b) testing.
Published 2024Subjects: -
97
-
98
-
99
-
100
Table_1_Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning.DOCX
Published 2024“…Subsequently, data cleansing, curation, and dimensionality reduction were performed to remove outliers, handle missing values, and exclude less predictive features. To identify the optimal model, the study evaluated and compared 15 SML algorithms arising from different machine learning (ML) families, including Bayesian, nearest-neighbors, decision trees, neural networks, quadratic discriminant analysis, logistic regression, bagging, boosting, random forests, and ensembles. …”