بدائل البحث:
phase optimization » whale optimization (توسيع البحث), based optimization (توسيع البحث), path optimization (توسيع البحث)
yet optimization » art optimization (توسيع البحث), lead optimization (توسيع البحث), path optimization (توسيع البحث)
binary marker » binary mask (توسيع البحث)
binary paper » binary pairs (توسيع البحث)
paper phase » vapor phase (توسيع البحث), later phase (توسيع البحث), per phase (توسيع البحث)
marker yet » marker set (توسيع البحث), marker sets (توسيع البحث), marker left (توسيع البحث)
phase optimization » whale optimization (توسيع البحث), based optimization (توسيع البحث), path optimization (توسيع البحث)
yet optimization » art optimization (توسيع البحث), lead optimization (توسيع البحث), path optimization (توسيع البحث)
binary marker » binary mask (توسيع البحث)
binary paper » binary pairs (توسيع البحث)
paper phase » vapor phase (توسيع البحث), later phase (توسيع البحث), per phase (توسيع البحث)
marker yet » marker set (توسيع البحث), marker sets (توسيع البحث), marker left (توسيع البحث)
-
1
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
2
-
3
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
4
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
5
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
6
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
7
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
8
The architecture of LSTM cell.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
9
The architecture of ILSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
10
Parameter setting for LSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
11
LITNET-2020 data splitting approach.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
12
Transformation of symbolic features in NSL-KDD.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"