Search alternatives:
process optimization » model optimization (Expand Search)
design optimization » bayesian optimization (Expand Search)
image process » damage process (Expand Search), image processing (Expand Search), simple process (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a design » _ design (Expand Search), co design (Expand Search)
process optimization » model optimization (Expand Search)
design optimization » bayesian optimization (Expand Search)
image process » damage process (Expand Search), image processing (Expand Search), simple process (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a design » _ design (Expand Search), co design (Expand Search)
-
141
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
142
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
143
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
144
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
145
Data_Sheet_1_A real-time driver fatigue identification method based on GA-GRNN.ZIP
Published 2022“…<p>It is of great practical and theoretical significance to identify driver fatigue state in real time and accurately and provide active safety warning in time. In this paper, a non-invasive and low-cost method of fatigue driving state identification based on genetic algorithm optimization of generalized regression neural network model is proposed. …”
-
146
Sample image for illustration.
Published 2024“…This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
-
147
Comparison analysis of computation time.
Published 2024“…This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
-
148
Precision recall curve.
Published 2024“…This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
-
149
Quadratic polynomial in 2D image plane.
Published 2024“…This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
-
150
-
151
Seed mix selection model
Published 2022“…</p> <p> </p> <p>We applied the seed mix selection model using a binary genetic algorithm to select seed mixes (R package ‘GA’; Scrucca 2013; Scrucca 2017). …”
-
152
Synthetic Realness: Authenticity Collapse in the Age of AI
Published 2025“…The concept reframes authenticity not as a binary but as a perception trap shaped by coherence bias and algorithmic polish.…”
-
153
Table 1_Heavy metal biomarkers and their impact on hearing loss risk: a machine learning framework analysis.docx
Published 2025“…Multiple machine learning algorithms, including Random Forest, XGBoost, Gradient Boosting, Logistic Regression, CatBoost, and MLP, were optimized and evaluated. …”
-
154
Models and Dataset
Published 2025“…<p dir="ltr"><b>P3DE (Parameter-less Population Pyramid with Deep Ensemble):</b><br>P3DE is a hybrid feature selection framework that combines the Parameter-less Population Pyramid (P3) metaheuristic optimization algorithm with a deep ensemble of autoencoders. …”
-
155
Fortran & C++: design fractal-type optical diffractive element
Published 2022“…</p> <p>(2) calculate diffraction fields for fractal and/or grid-matrix (binary) phase-holograms.</p> <p>(3) optimize the fractal and/or grid-matrix holograms for given target diffraction images, using annealing algorithms. …”