بدائل البحث:
required optimization » guided optimization (توسيع البحث), resource optimization (توسيع البحث), feature optimization (توسيع البحث)
design optimization » bayesian optimization (توسيع البحث)
data required » data acquired (توسيع البحث)
primary data » primary care (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case design » based design (توسيع البحث), game design (توسيع البحث), core design (توسيع البحث)
required optimization » guided optimization (توسيع البحث), resource optimization (توسيع البحث), feature optimization (توسيع البحث)
design optimization » bayesian optimization (توسيع البحث)
data required » data acquired (توسيع البحث)
primary data » primary care (توسيع البحث)
binary case » binary mask (توسيع البحث), binary image (توسيع البحث), primary case (توسيع البحث)
case design » based design (توسيع البحث), game design (توسيع البحث), core design (توسيع البحث)
-
1
MSE for ILSTM algorithm in binary classification.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
2
-
3
-
4
-
5
Dendrogram of the stock prices.
منشور في 2025"…This article uses feature-based models to investigate the primary elements that contribute to the optimal composition of a specific portfolio. …"
-
6
Descriptive statistics on stock prices.
منشور في 2025"…This article uses feature-based models to investigate the primary elements that contribute to the optimal composition of a specific portfolio. …"
-
7
Correlation heatmap of the principal components.
منشور في 2025"…This article uses feature-based models to investigate the primary elements that contribute to the optimal composition of a specific portfolio. …"
-
8
-
9
-
10
-
11
-
12
-
13
ECE6379_PSOM.zip
منشور في 2021"…Optimization algorithms that are commonly used to solve these problems will also be covered including linear programming, mixed-integer linear programming, Lagrange relaxation, dynamic programming, branch and bound, and duality theory.…"
-
14
Summary of LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
15
SHAP analysis for LITNET-2020 dataset.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
16
Comparison of intrusion detection systems.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
17
Parameter setting for CBOA and PSO.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
18
NSL-KDD dataset description.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
19
The architecture of LSTM cell.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"
-
20
The architecture of ILSTM.
منشور في 2023"…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …"