Search alternatives:
learning optimization » learning motivation (Expand Search), lead optimization (Expand Search)
process optimization » model optimization (Expand Search)
e learning » _ learning (Expand Search), deep learning (Expand Search)
a process » _ process (Expand Search)
binary e » binary _ (Expand Search), binary b (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
learning optimization » learning motivation (Expand Search), lead optimization (Expand Search)
process optimization » model optimization (Expand Search)
e learning » _ learning (Expand Search), deep learning (Expand Search)
a process » _ process (Expand Search)
binary e » binary _ (Expand Search), binary b (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
-
81
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
82
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
83
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
84
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
85
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
86
Parameter settings.
Published 2024“…<div><p>Differential Evolution (DE) is widely recognized as a highly effective evolutionary algorithm for global optimization. …”
-
87
-
88
-
89
-
90
-
91
-
92
-
93
-
94
MCLP_quantum_annealer_V0.5
Published 2025“…This paper presents a quantum computing path for Transformation-to-Sampling-to-Verification of geospatial optimization problems, adaptable to the controlled qubit scale and coherence constraints under current NISQ conditions. …”
-
95
Machine Learning-Ready Dataset for Cytotoxicity Prediction of Metal Oxide Nanoparticles
Published 2025“…</p><p dir="ltr">IC50 (µg/mL): The concentration at which 50% of cells are inhibited, used as a toxicity threshold.</p><p dir="ltr">These biological metrics were used to define a binary toxicity label: entries were classified as toxic (1) or non-toxic (0) based on thresholds from standardized guidelines (e.g., ISO 10993-5:2009) and literature consensus. …”
-
96
-
97
Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment
Published 2019“…This result reflects the effectiveness of the algorithm, which provides a basis for the effective analysis and processing of image big data.…”
-
98
Confusion matrix.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
99
Parameter settings.
Published 2025“…Subsequently, we implement an optimal binary tree decision-making algorithm, grounded in dynamic programming, to achieve precise allocation of elastic resources within data streams, significantly bolstering resource utilization. …”
-
100
Psoas muscle CT radiomics-based machine learning models to predict response to infliximab in patients with Crohn’s disease
Published 2025“…<i>Z</i> score standardization and independent sample <i>t</i> test were applied to identify optimal predictive features, which were then utilized in seven ML algorithms for training and validation. …”