Showing 21 - 40 results of 53 for search '(( binary data processing detection algorithm ) OR ( binary base swarm optimization algorithm ))*', query time: 0.67s Refine Results
  1. 21

    Parameter setting for LSTM. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. …”
  2. 22

    LITNET-2020 data splitting approach. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. …”
  3. 23

    Transformation of symbolic features in NSL-KDD. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…In this paper, a novel, and improved version of the Long Short-Term Memory (ILSTM) algorithm was proposed. The ILSTM is based on the novel integration of the chaotic butterfly optimization algorithm (CBOA) and particle swarm optimization (PSO) to improve the accuracy of the LSTM algorithm. …”
  4. 24

    Data set constituents. by Rémy Peyret (14691736)

    Published 2023
    “…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29

    Results of the model on test sets 1 and 2. by Rémy Peyret (14691736)

    Published 2023
    “…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
  10. 30

    Scanners and staining methods. by Rémy Peyret (14691736)

    Published 2023
    “…The high performance of the algorithm at both centers shows that the calibration process is efficient. …”
  11. 31
  12. 32

    the functioning of BRPSO. by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  13. 33

    Characteristic of 6- and 10-story SMRF [99,98]. by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  14. 34

    The RFD’s behavior mechanism (2002). by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  15. 35
  16. 36

    Related studies on IDS using deep learning. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  17. 37

    The architecture of the BI-LSTM model. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  18. 38

    Comparison of accuracy and DR on UNSW-NB15. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  19. 39

    Comparison of DR and FPR of UNSW-NB15. by Arshad Hashmi (13835488)

    Published 2024
    “…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
  20. 40

    Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish) by Daniel Pérez Palau (11097348)

    Published 2024
    “…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …”