Search alternatives:
design optimization » bayesian optimization (Expand Search)
binary task » binary mask (Expand Search)
task design » based design (Expand Search)
Showing 81 - 100 results of 107 for search '(( binary task design optimization algorithm ) OR ( binary also design optimization algorithm ))', query time: 0.29s Refine Results
  1. 81

    Results of Extra tree. by Balraj Preet Kaur (20370832)

    Published 2024
    “…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …”
  2. 82

    Gradient boosting classifier results. by Balraj Preet Kaur (20370832)

    Published 2024
    “…To optimize the parameters of the machine learning algorithms, hyperparameter optimization with a genetic algorithm is proposed and to reduce the size of the feature set, feature selection is performed using binary grey wolf optimization algorithm. …”
  3. 83

    the functioning of BRPSO. by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  4. 84

    Characteristic of 6- and 10-story SMRF [99,98]. by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  5. 85

    The RFD’s behavior mechanism (2002). by Hossein Jarrahi (22530251)

    Published 2025
    “…A sensitivity analysis of key RFD parameters, including frictional moment and rigid beam length, highlights their influence on seismic performance. The optimization problem is formulated based on the seismic energy dissipation concept, employing a modified binary and real-coded particle swarm optimization (BRPSO) algorithm. …”
  6. 86

    Predicting Thermal Decomposition Temperature of Binary Imidazolium Ionic Liquid Mixtures from Molecular Structures by Hongpeng He (348094)

    Published 2021
    “…The subset of optimal descriptors was screened by combining the genetic algorithm with the multiple linear regression method. …”
  7. 87

    Sample image for illustration. by Indhumathi S. (19173013)

    Published 2024
    “…<div><p>Feature description is a critical task in Augmented Reality Tracking. This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
  8. 88

    Comparison analysis of computation time. by Indhumathi S. (19173013)

    Published 2024
    “…<div><p>Feature description is a critical task in Augmented Reality Tracking. This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
  9. 89

    Process flow diagram of CBFD. by Indhumathi S. (19173013)

    Published 2024
    “…<div><p>Feature description is a critical task in Augmented Reality Tracking. This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
  10. 90

    Precision recall curve. by Indhumathi S. (19173013)

    Published 2024
    “…<div><p>Feature description is a critical task in Augmented Reality Tracking. This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
  11. 91

    Quadratic polynomial in 2D image plane. by Indhumathi S. (19173013)

    Published 2024
    “…<div><p>Feature description is a critical task in Augmented Reality Tracking. This article introduces a Convex Based Feature Descriptor (CBFD) system designed to withstand rotation, lighting, and blur variations while remaining computationally efficient. …”
  12. 92

    Multicategory Angle-Based Learning for Estimating Optimal Dynamic Treatment Regimes With Censored Data by Fei Xue (24567)

    Published 2021
    “…Specifically, the proposed method obtains the optimal DTR via integrating estimations of decision rules at multiple stages into a single multicategory classification algorithm without imposing additional constraints, which is also more computationally efficient and robust. …”
  13. 93

    Data_Sheet_1_Physics-Inspired Optimization for Quadratic Unconstrained Problems Using a Digital Annealer.pdf by Maliheh Aramon (6557906)

    Published 2019
    “…<p>The Fujitsu Digital Annealer is designed to solve fully connected quadratic unconstrained binary optimization (QUBO) problems. …”
  14. 94

    Summary of LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  15. 95

    SHAP analysis for LITNET-2020 dataset. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  16. 96

    Comparison of intrusion detection systems. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  17. 97

    Parameter setting for CBOA and PSO. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  18. 98

    NSL-KDD dataset description. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  19. 99

    The architecture of LSTM cell. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
  20. 100

    The architecture of ILSTM. by Asmaa Ahmed Awad (16726315)

    Published 2023
    “…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”