Search alternatives:
based classification » image classification (Expand Search), binary classification (Expand Search), _ classification (Expand Search)
based optimization » whale optimization (Expand Search)
binary phase » binary image (Expand Search), final phase (Expand Search)
phase based » case based (Expand Search)
binary b » binary _ (Expand Search)
b based » _ based (Expand Search), 1 based (Expand Search), 2 based (Expand Search)
based classification » image classification (Expand Search), binary classification (Expand Search), _ classification (Expand Search)
based optimization » whale optimization (Expand Search)
binary phase » binary image (Expand Search), final phase (Expand Search)
phase based » case based (Expand Search)
binary b » binary _ (Expand Search)
b based » _ based (Expand Search), 1 based (Expand Search), 2 based (Expand Search)
-
41
-
42
Dataset 1: Zip file containing the figures of the presented methods and results in jpeg files
Published 2025“…<p dir="ltr">Figures represented here illustrates the <b>metaheuristic-based band selection framework</b> for hyperspectral image classification using <b>Binary Jaya Algorithm enhanced with a mutation operator</b> to improve population diversity and avoid premature convergence. …”
-
43
Data_Sheet_1_Multiclass Classification Based on Combined Motor Imageries.pdf
Published 2020“…The proposed multilabel approaches convert the original 8-class problem into a set of three binary problems to facilitate the use of the CSP algorithm. …”
-
44
<i>hi</i>PRS algorithm process flow.
Published 2023“…<b>(B)</b> Focusing on the positive class only, the algorithm exploits FIM (<i>apriori</i> algorithm) to build a list of candidate interactions of any desired order, retaining those that have an empirical frequency above a given threshold <i>δ</i>. …”
-
45
-
46
-
47
-
48
-
49
-
50
-
51
Design and implementation of the Multiple Criteria Decision Making (MCDM) algorithm for predicting the severity of COVID-19.
Published 2021“…<p>(A). The MCDM algorithm-Stage 1. Preprocessing, this stage is the process of refining the collected raw data to eliminate noise, including correlation analysis and feature selection based on P values. …”
-
52
-
53
-
54
Flowchart scheme of the ML-based model.
Published 2024“…<b>Fii)</b> Texture information using local binary patterns. …”
-
55
-
56
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
57
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
58
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
59
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
60
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”