يعرض 81 - 100 نتائج من 108 نتيجة بحث عن '(( binary model design optimization algorithm ) OR ( binary leave process optimization algorithm ))', وقت الاستعلام: 0.63s تنقيح النتائج
  1. 81

    Predicting Thermal Decomposition Temperature of Binary Imidazolium Ionic Liquid Mixtures from Molecular Structures حسب Hongpeng He (348094)

    منشور في 2021
    "…The subset of optimal descriptors was screened by combining the genetic algorithm with the multiple linear regression method. …"
  2. 82

    Pseudo Code of RBMO. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  3. 83

    P-value on CEC-2017(Dim = 30). حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  4. 84

    Memory storage behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  5. 85

    Elite search behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  6. 86

    Description of the datasets. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  7. 87

    S and V shaped transfer functions. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  8. 88

    S- and V-Type transfer function diagrams. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  9. 89

    Collaborative hunting behavior. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  10. 90

    Friedman average rank sum test results. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  11. 91

    IRBMO vs. variant comparison adaptation data. حسب Chenyi Zhu (9383370)

    منشور في 2025
    "…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. …"
  12. 92

    Solubility Prediction of Different Forms of Pharmaceuticals in Single and Mixed Solvents Using Symmetric Electrolyte Nonrandom Two-Liquid Segment Activity Coefficient Model حسب Getachew S. Molla (6416744)

    منشور في 2019
    "…Moreover, a design of experiments is included in the methodology to generate and use experimental data appropriately for model parameter regression and model validation. …"
  13. 93

    Seed mix selection model حسب Bethanne Bruninga-Socolar (10923639)

    منشور في 2022
    "…</p> <p>  </p> <p>We applied the seed mix selection model using a binary genetic algorithm to select seed mixes (R package ‘GA’; Scrucca 2013; Scrucca 2017). …"
  14. 94

    MCLP_quantum_annealer_V0.5 حسب Anonymous Anonymous (4854526)

    منشور في 2025
    "…Finally, for spatial relationship verification, a Spatial Coverage Consistency Checking Operator for MCLP Results (SCCCOMR) is designed. Theoretical and applied experiments are conducted using four solvers: QBSolv, D-Wave Hybrid binary quadratic model 2, D-Wave Advantage system 4.1, and Gurobi. …"
  15. 95

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  16. 96

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  17. 97

    Comparison of intrusion detection systems. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  18. 98

    Parameter setting for CBOA and PSO. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  19. 99

    NSL-KDD dataset description. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
  20. 100

    The architecture of LSTM cell. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"