بدائل البحث:
codon optimization » wolf optimization (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
primary data » primary care (توسيع البحث)
data codon » data code (توسيع البحث), data codes (توسيع البحث), data codings (توسيع البحث)
binary 2 » binary _ (توسيع البحث), binary b (توسيع البحث)
2 based » _ based (توسيع البحث), 1 based (توسيع البحث), ai based (توسيع البحث)
codon optimization » wolf optimization (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
primary data » primary care (توسيع البحث)
data codon » data code (توسيع البحث), data codes (توسيع البحث), data codings (توسيع البحث)
binary 2 » binary _ (توسيع البحث), binary b (توسيع البحث)
2 based » _ based (توسيع البحث), 1 based (توسيع البحث), ai based (توسيع البحث)
-
61
Memory storage behavior.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
62
Elite search behavior.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
63
Description of the datasets.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
64
S and V shaped transfer functions.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
65
S- and V-Type transfer function diagrams.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
66
Collaborative hunting behavior.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
67
Friedman average rank sum test results.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
68
IRBMO vs. variant comparison adaptation data.
منشور في 2025"…In order to comprehensively verify the performance of IRBMO, this paper designs a series of experiments to compare it with nine mainstream binary optimization algorithms. The experiments are based on 12 medical datasets, and the results show that IRBMO achieves optimal overall performance in key metrics such as fitness value, classification accuracy and specificity. …"
-
69
Analysis and design of algorithms for the manufacturing process of integrated circuits
منشور في 2023"…The (approximate) solution proposals of state-of-the-art methods include rule-based approaches, genetic algorithms, and reinforcement learning. …"
-
70
-
71
-
72
Testing results for classifying AD, MCI and NC.
منشور في 2024"…Specifically, an image enhancement algorithm based on histogram equalization and bilateral filtering techniques was deployed to reduce noise and enhance the quality of the images. …"
-
73
Summary of existing CNN models.
منشور في 2024"…Specifically, an image enhancement algorithm based on histogram equalization and bilateral filtering techniques was deployed to reduce noise and enhance the quality of the images. …"
-
74
Data_Sheet_1_A real-time driver fatigue identification method based on GA-GRNN.ZIP
منشور في 2022"…In this paper, a non-invasive and low-cost method of fatigue driving state identification based on genetic algorithm optimization of generalized regression neural network model is proposed. …"
-
75
-
76
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
77
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
78
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
79
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
80
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"