بدائل البحث:
model optimization » codon optimization (توسيع البحث), global optimization (توسيع البحث), based optimization (توسيع البحث)
binary more » binary image (توسيع البحث)
more model » mouse model (توسيع البحث), score model (توسيع البحث), care model (توسيع البحث)
model optimization » codon optimization (توسيع البحث), global optimization (توسيع البحث), based optimization (توسيع البحث)
binary more » binary image (توسيع البحث)
more model » mouse model (توسيع البحث), score model (توسيع البحث), care model (توسيع البحث)
-
21
Friedman average rank sum test results.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
22
IRBMO vs. variant comparison adaptation data.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
23
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
24
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
25
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
26
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
27
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
28
The architecture of LSTM cell.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
29
The architecture of ILSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
30
Parameter setting for LSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
31
LITNET-2020 data splitting approach.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
32
Transformation of symbolic features in NSL-KDD.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
33
Table_1_bSRWPSO-FKNN: A boosted PSO with fuzzy K-nearest neighbor classifier for predicting atopic dermatitis disease.docx
منشور في 2023"…</p>Methods<p>This paper establishes a medical prediction model for the first time on the basis of the enhanced particle swarm optimization (SRWPSO) algorithm and the fuzzy K-nearest neighbor (FKNN), called bSRWPSO-FKNN, which is practiced on a dataset related to patients with AD. …"
-
34
Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish)
منشور في 2024"…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …"
-
35
Seed mix selection model
منشور في 2022"…</p> <p> </p> <p>We applied the seed mix selection model using a binary genetic algorithm to select seed mixes (R package ‘GA’; Scrucca 2013; Scrucca 2017). …"
-
36
Thesis-RAMIS-Figs_Slides
منشور في 2024"…Importantly, this strategy locates samples adaptively on the transition between facies which improves the performance of conventional \emph{<i>MPS</i>} algorithms. In conclusion, this work shows that preferential sampling can contribute in \emph{<i>MPS</i>} even at very small sampling regimes and, as a corollary, demonstrates that prior models (obtained form a training image) can be used effectively not only to simulate non-sensed variables of the field, but to decide where to measure next.…"
-
37
Natural language processing for automated quantification of bone metastases reported in free-text bone scintigraphy reports
منشور في 2020"…The aim of this study was to develop a natural language processing (NLP) algorithm for binary classification (single metastasis versus two or more metastases) in bone scintigraphy reports of patients undergoing surgery for bone metastases.…"
-
38
Data Sheet 1_Detection of litchi fruit maturity states based on unmanned aerial vehicle remote sensing and improved YOLOv8 model.docx
منشور في 2025"…In addition, YOLOv8-FPDW was more competitive than mainstream object detection algorithms. …"
-
39
Supplementary Material 8
منشور في 2025"…In AMR studies, datasets often contain more susceptible isolates than resistant ones, leading to biased model performance. …"
-
40
DataSheet_1_Near infrared spectroscopy for cooking time classification of cassava genotypes.docx
منشور في 2024"…Classification of genotypes was carried out using the K-nearest neighbor algorithm (KNN) and partial least squares (PLS) models. …"