يعرض 101 - 120 نتائج من 180 نتيجة بحث عن '(( binary ii design optimization algorithm ) OR ( binary based models optimization algorithm ))', وقت الاستعلام: 0.52s تنقيح النتائج
  1. 101

    Adaboost classifier results. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  2. 102

    Results of Lightbgm. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  3. 103

    Results of Lightbgm. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  4. 104

    Feature selection process. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  5. 105

    Results of KNN. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  6. 106

    After upsampling. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  7. 107

    Results of Extra tree. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  8. 108

    Gradient boosting classifier results. حسب Balraj Preet Kaur (20370832)

    منشور في 2024
    "…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …"
  9. 109

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  10. 110

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  11. 111

    Comparison of intrusion detection systems. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  12. 112

    Parameter setting for CBOA and PSO. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  13. 113

    NSL-KDD dataset description. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  14. 114

    The architecture of LSTM cell. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  15. 115

    The architecture of ILSTM. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  16. 116

    Parameter setting for LSTM. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  17. 117

    LITNET-2020 data splitting approach. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  18. 118

    Transformation of symbolic features in NSL-KDD. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  19. 119

    <i>hi</i>PRS algorithm process flow. حسب Michela C. Massi (14599915)

    منشور في 2023
    "…From this dataset we can compute the MI between each interaction and the outcome and <b>(D)</b> obtain a ranked list (<i>I</i><sub><i>δ</i></sub>) based on this metric. <b>(E)</b> Starting from the interaction at the top of <i>I</i><sub><i>δ</i></sub>, <i>hi</i>PRS constructs <i>I</i><sub><i>K</i></sub>, selecting <i>K</i> (where <i>K</i> is user-specified) terms through the greedy optimization of the ratio between MI (<i>relevance</i>) and a suitable measure of similarity for interactions (<i>redundancy)</i> (cf. …"
  20. 120

    Flowchart scheme of the ML-based model. حسب Noshaba Qasmi (20405009)

    منشور في 2024
    "…<b>I)</b> Testing data consisting of 20% of the entire dataset. <b>J)</b> Optimization of hyperparameter tuning. <b>K)</b> Algorithm selection from all models. …"