Showing 41 - 60 results of 75 for search '(( binary image care optimization algorithm ) OR ( binary based network optimization algorithm ))', query time: 0.63s Refine Results
  1. 41

    Training losses for N = 10. by Hend Bayoumi (22693738)

    Published 2025
    “…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …”
  2. 42

    Normalized computation rate for N = 10. by Hend Bayoumi (22693738)

    Published 2025
    “…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …”
  3. 43

    Summary of Notations Used in this paper. by Hend Bayoumi (22693738)

    Published 2025
    “…EHRL integrates Reinforcement Learning (RL) with Deep Neural Networks (DNNs) to dynamically optimize binary offloading decisions, which in turn obviates the requirement for manually labeled training data and thus avoids the need for solving complex optimization problems repeatedly. …”
  4. 44
  5. 45

    datasheet1_Graph Neural Networks for Maximum Constraint Satisfaction.pdf by Jan Tönshoff (10192709)

    Published 2021
    “…We introduce a graph neural network architecture for solving such optimization problems. …”
  6. 46

    SHAP bar plot. by Meng Cao (105914)

    Published 2025
    “…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
  7. 47

    Sample screening flowchart. by Meng Cao (105914)

    Published 2025
    “…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
  8. 48

    Descriptive statistics for variables. by Meng Cao (105914)

    Published 2025
    “…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
  9. 49

    SHAP summary plot. by Meng Cao (105914)

    Published 2025
    “…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
  10. 50

    ROC curves for the test set of four models. by Meng Cao (105914)

    Published 2025
    “…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
  11. 51

    Display of the web prediction interface. by Meng Cao (105914)

    Published 2025
    “…Subsequently, a CI risk prediction model was constructed using four machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), Neural Network (NN), and Logistic Regression (LR). …”
  12. 52

    Improved support vector machine classification algorithm based on adaptive feature weight updating in the Hadoop cluster environment by Jianfang Cao (1881379)

    Published 2019
    “…<div><p>An image classification algorithm based on adaptive feature weight updating is proposed to address the low classification accuracy of the current single-feature classification algorithms and simple multifeature fusion algorithms. …”
  13. 53

    Data_Sheet_1_A real-time driver fatigue identification method based on GA-GRNN.ZIP by Xiaoyuan Wang (492534)

    Published 2022
    “…In this paper, a non-invasive and low-cost method of fatigue driving state identification based on genetic algorithm optimization of generalized regression neural network model is proposed. …”
  14. 54

    Summary of LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  15. 55

    SHAP analysis for LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  16. 56

    Comparison of intrusion detection systems. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  17. 57

    Parameter setting for CBOA and PSO. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  18. 58

    NSL-KDD dataset description. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  19. 59

    The architecture of LSTM cell. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  20. 60

    The architecture of ILSTM. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”