بدائل البحث:
models optimization » model optimization (توسيع البحث), process optimization (توسيع البحث), wolf optimization (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
binary based » library based (توسيع البحث), linac based (توسيع البحث), binary mask (توسيع البحث)
based models » based model (توسيع البحث)
binary ii » binary _ (توسيع البحث), binary b (توسيع البحث)
ii based » i based (توسيع البحث), ai based (توسيع البحث), mri based (توسيع البحث)
models optimization » model optimization (توسيع البحث), process optimization (توسيع البحث), wolf optimization (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
binary based » library based (توسيع البحث), linac based (توسيع البحث), binary mask (توسيع البحث)
based models » based model (توسيع البحث)
binary ii » binary _ (توسيع البحث), binary b (توسيع البحث)
ii based » i based (توسيع البحث), ai based (توسيع البحث), mri based (توسيع البحث)
-
101
The architecture of LSTM cell.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
102
The architecture of ILSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
103
Parameter setting for LSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
104
LITNET-2020 data splitting approach.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
105
Transformation of symbolic features in NSL-KDD.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
106
-
107
-
108
-
109
-
110
-
111
-
112
Medium-scale dataset comparative analysis using the number of features selected.
منشور في 2023الموضوعات: -
113
-
114
Large-scale dataset comparative analysis using the number of features selected.
منشور في 2023الموضوعات: -
115
-
116
-
117
-
118
-
119
-
120