Search alternatives:
utilization algorithm » initialization algorithm (Expand Search), optimization algorithms (Expand Search), maximization algorithm (Expand Search)
practice utilization » practice participation (Expand Search), effective utilization (Expand Search), service utilization (Expand Search)
halide optimization » whale optimization (Expand Search), acid optimization (Expand Search), quality optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based halide » based solid (Expand Search)
less based » lens based (Expand Search), lemos based (Expand Search), degs based (Expand Search)
utilization algorithm » initialization algorithm (Expand Search), optimization algorithms (Expand Search), maximization algorithm (Expand Search)
practice utilization » practice participation (Expand Search), effective utilization (Expand Search), service utilization (Expand Search)
halide optimization » whale optimization (Expand Search), acid optimization (Expand Search), quality optimization (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
based halide » based solid (Expand Search)
less based » lens based (Expand Search), lemos based (Expand Search), degs based (Expand Search)
-
1
-
2
-
3
CNN-GRU based on GA.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
4
Table 1_Provider fidelity in tuberculosis screening practices among adolescents and adults living with HIV in public health facilities in Tanzania: a cross-sectional evaluation.doc...
Published 2025“…Despite national and global guidelines recommending routine TB screening at every clinical encounter, missed and delayed TB case notifications persist, suggesting gaps in screening practices. This study evaluated the implementation fidelity of the TB screening algorithm and associated factors within routine HIV care in public health facilities in Geita, Tanzania. …”
-
5
Table 2_Provider fidelity in tuberculosis screening practices among adolescents and adults living with HIV in public health facilities in Tanzania: a cross-sectional evaluation.doc...
Published 2025“…Despite national and global guidelines recommending routine TB screening at every clinical encounter, missed and delayed TB case notifications persist, suggesting gaps in screening practices. This study evaluated the implementation fidelity of the TB screening algorithm and associated factors within routine HIV care in public health facilities in Geita, Tanzania. …”
-
6
-
7
Metrics of the complex network algorithm.
Published 2025“…In this study, the travel diaries of 4,306 tourists were employed as the primary data source, and the Louvain algorithm was applied to identify tourist flow networks with different motives; moreover, the complex network method was utilized to analyze the hierarchical structure and heterogeneity of the organizational patterns of tourist flow networks with different motives. …”
-
8
-
9
-
10
-
11
Specific architecture of modern ICS.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
12
Comparison of accuracy of feature classification.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
13
Pseudo-code for the study design model.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
14
GA process.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
15
CICIDS2017 Training results on the dataset.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
16
1d-MC model architecture.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
17
The experimental basic environment parameters.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
18
GA pseudo-code.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
19
1d-MS CNN + GRU model structure.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
20
Comparison of running times of four models.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”