بدائل البحث:
guide optimization » guided optimization (توسيع البحث), driven optimization (توسيع البحث), whale optimization (توسيع البحث)
robust detection » object detection (توسيع البحث), point detection (توسيع البحث), first detection (توسيع البحث)
binary may » binary mask (توسيع البحث), binary image (توسيع البحث)
guide optimization » guided optimization (توسيع البحث), driven optimization (توسيع البحث), whale optimization (توسيع البحث)
robust detection » object detection (توسيع البحث), point detection (توسيع البحث), first detection (توسيع البحث)
binary may » binary mask (توسيع البحث), binary image (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
The Pseudo-Code of the IRBMO Algorithm.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
9
IRBMO vs. meta-heuristic algorithms boxplot.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
10
IRBMO vs. feature selection algorithm boxplot.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
11
-
12
Related studies on IDS using deep learning.
منشور في 2024"…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …"
-
13
The architecture of the BI-LSTM model.
منشور في 2024"…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …"
-
14
Comparison of accuracy and DR on UNSW-NB15.
منشور في 2024"…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …"
-
15
Comparison of DR and FPR of UNSW-NB15.
منشور في 2024"…This imbalance can adversely affect the learning process of predictive models, often resulting in high false-negative rates, a major concern in Intrusion Detection Systems (IDS). By focusing on datasets with this imbalance, we aim to develop and refine advanced algorithms and techniques, such as anomaly detection, cost-sensitive learning, and oversampling methods, to effectively handle such disparities. …"
-
16
Pseudo Code of RBMO.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
17
P-value on CEC-2017(Dim = 30).
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
18
Memory storage behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
19
Elite search behavior.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
20
Description of the datasets.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"