بدائل البحث:
maximization algorithm » optimization algorithms (توسيع البحث), classification algorithm (توسيع البحث)
resource maximization » resource optimization (توسيع البحث), resource utilization (توسيع البحث), resource limitation (توسيع البحث)
design optimization » bayesian optimization (توسيع البحث)
time resource » situ resource (توسيع البحث), firm resource (توسيع البحث), optimize resource (توسيع البحث)
binary time » binary image (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case design » based design (توسيع البحث), game design (توسيع البحث), core design (توسيع البحث)
maximization algorithm » optimization algorithms (توسيع البحث), classification algorithm (توسيع البحث)
resource maximization » resource optimization (توسيع البحث), resource utilization (توسيع البحث), resource limitation (توسيع البحث)
design optimization » bayesian optimization (توسيع البحث)
time resource » situ resource (توسيع البحث), firm resource (توسيع البحث), optimize resource (توسيع البحث)
binary time » binary image (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case design » based design (توسيع البحث), game design (توسيع البحث), core design (توسيع البحث)
-
1
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
2
Comparison of total time consumed for different offloading algorithms.for N = 10, 20, 30.
منشور في 2025الموضوعات: -
3
-
4
-
5
The evolution of the Wireless Power Transfer (WPT) time fraction β over simulation frames.
منشور في 2025الموضوعات: -
6
Comparisons of computation rate performance for different offloading algorithms.for N = 10, 20, 30.
منشور في 2025الموضوعات: -
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
CDF of task latency, approximated as the inverse of the achieved computation rate.
منشور في 2025الموضوعات: -
16
-
17
-
18
-
19
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
20
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"