بدائل البحث:
process optimization » model optimization (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
primary data » primary care (توسيع البحث)
data process » data processing (توسيع البحث), damage process (توسيع البحث), data access (توسيع البحث)
binary cases » binary values (توسيع البحث), binary labels (توسيع البحث), binary mask (توسيع البحث)
cases based » case based (توسيع البحث), scores based (توسيع البحث), values based (توسيع البحث)
process optimization » model optimization (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
primary data » primary care (توسيع البحث)
data process » data processing (توسيع البحث), damage process (توسيع البحث), data access (توسيع البحث)
binary cases » binary values (توسيع البحث), binary labels (توسيع البحث), binary mask (توسيع البحث)
cases based » case based (توسيع البحث), scores based (توسيع البحث), values based (توسيع البحث)
-
81
-
82
-
83
Trace, Machine Learning of Signal Images for Trace-Sensitive Mass Spectrometry: A Case Study from Single-Cell Metabolomics
منشور في 2019"…However, extraction of trace-abundance signals from complex data sets (<i>m</i>/<i>z</i> value, separation time, signal abundance) that result from ultrasensitive studies requires improved data processing algorithms. …"
-
84
Trace, Machine Learning of Signal Images for Trace-Sensitive Mass Spectrometry: A Case Study from Single-Cell Metabolomics
منشور في 2019"…However, extraction of trace-abundance signals from complex data sets (<i>m</i>/<i>z</i> value, separation time, signal abundance) that result from ultrasensitive studies requires improved data processing algorithms. …"
-
85
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
86
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
87
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
88
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
89
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
90
The architecture of LSTM cell.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
91
The architecture of ILSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
92
Parameter setting for LSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
93
LITNET-2020 data splitting approach.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
94
Transformation of symbolic features in NSL-KDD.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
95
-
96
-
97
Analysis and design of algorithms for the manufacturing process of integrated circuits
منشور في 2023"…From this, we propose: (i) a new ILP model, and (ii) a new solution representation, which, unlike the reference work, guarantees that feasible solutions are obtained throughout the generation of new individuals. Based on this new representation, we proposed and evaluated other approximate methods, including a greedy algorithm and a genetic algorithm that improve the state-of-the-art results for test cases usually used in the literature. …"
-
98
-
99
-
100
Supporting data for “The role of forest composition heterogeneity on temperate ecosystem carbon dynamic under climate change"
منشور في 2025"…The process includes (1) harmonizing Landsat 5, 7, 8, and Sentinel-2 data using the HLS algorithm, and (2) filling temporal gaps with an optimized object-based STARFM fusion algorithm. …"