Search alternatives:
using optimization » joint optimization (Expand Search), design optimization (Expand Search), learning optimization (Expand Search)
step optimization » after optimization (Expand Search), swarm optimization (Expand Search), based optimization (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data step » data set (Expand Search)
using optimization » joint optimization (Expand Search), design optimization (Expand Search), learning optimization (Expand Search)
step optimization » after optimization (Expand Search), swarm optimization (Expand Search), based optimization (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data step » data set (Expand Search)
-
1
-
2
The Pseudo-Code of the IRBMO Algorithm.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
-
3
IRBMO vs. meta-heuristic algorithms boxplot.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
-
4
IRBMO vs. feature selection algorithm boxplot.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
IRBMO vs. variant comparison adaptation data.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
-
17
-
18
-
19
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
20
Pseudo Code of RBMO.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”