Search alternatives:
based optimization » whale optimization (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
pairs based » pairs used (Expand Search)
data rapid » data rasio (Expand Search)
based optimization » whale optimization (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
pairs based » pairs used (Expand Search)
data rapid » data rasio (Expand Search)
-
1
-
2
-
3
<i>hi</i>PRS algorithm process flow.
Published 2023“…From this dataset we can compute the MI between each interaction and the outcome and <b>(D)</b> obtain a ranked list (<i>I</i><sub><i>δ</i></sub>) based on this metric. <b>(E)</b> Starting from the interaction at the top of <i>I</i><sub><i>δ</i></sub>, <i>hi</i>PRS constructs <i>I</i><sub><i>K</i></sub>, selecting <i>K</i> (where <i>K</i> is user-specified) terms through the greedy optimization of the ratio between MI (<i>relevance</i>) and a suitable measure of similarity for interactions (<i>redundancy)</i> (cf. …”
-
4
-
5
Related studies on IDS using deep learning.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
6
The architecture of the BI-LSTM model.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
7
Comparison of accuracy and DR on UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
8
Comparison of DR and FPR of UNSW-NB15.
Published 2024“…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …”
-
9
-
10
-
11
Sexual behavioural variables by HIV status.
Published 2023“…The national HIV screening algorithm was used for HIV testing while two rapid detection tests were used to confirm HBV infections. …”
-
12
Characteristics of study participants.
Published 2023“…The national HIV screening algorithm was used for HIV testing while two rapid detection tests were used to confirm HBV infections. …”
-
13
-
14
-
15
Data_Sheet_1_Multiclass Classification Based on Combined Motor Imageries.pdf
Published 2020“…And we propose two new multilabel uses of the Common Spatial Pattern (CSP) algorithm to optimize the signal-to-noise ratio, namely MC2CMI and MC2SMI approaches. …”
-
16
Seed mix selection model
Published 2022“…The model thus requires three types of data presented as matrices in order to calculate the maximum number of bee species supported by a given seed mix: 1) adult phenology of each bee species, where each cell represents whether or not that bee species was observed in the data during a given time period, 2) flowering phenology of plants, where each cell represents whether or not a bee was collected from that plant species during a given time period, and 3) pairwise interactions between plant species and bee species, where each cell represents whether each plant-bee species pair was observed interacting in the data.</p> <p> </p> <p>We applied the seed mix selection model using a binary genetic algorithm to select seed mixes (R package ‘GA’; Scrucca 2013; Scrucca 2017). …”