Search alternatives:
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
based selection » based detection (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
based selection » based detection (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
1
The Pseudo-Code of the IRBMO Algorithm.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
-
2
-
3
-
4
-
5
-
6
-
7
Reported MATLAB data code.
Published 2025“…Validation with standard rheometer data showed reasonable agreement in elasticity, with percent differences of 2.1% for the hard and 13.3% for the soft phantoms. …”
-
8
Greedy optimization algorithm.
Published 2024“…The horizontal orange dashed line indicates the codelength of the corresponding simple graph model without motifs (see Motif-free reference codes). (D) The algorithm is run a hundred times for each dyadic base model and the most compressing model is selected. …”
-
9
-
10
-
11
-
12
-
13
Pseudo Code of RBMO.
Published 2025“…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
-
14
-
15
-
16
Comparative performance evaluation of 3Mont with other feature selection algorithms over 10 iterations.
Published 2025“…Abbreviations: SKB: SelectKBest, FCBF: Fast Correlation Based Filter, IG: Information Gain, CMIM: Conditional Mutual Information Maximization, MRMR: Minimum Redundancy Maximum Relevance.…”
-
17
GA pseudo-code.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
18
Analysis of the proposed method with the other state-of-the-art methods based on recall.
Published 2025Subjects: -
19
Analysis of the proposed method with the other state of the art methods based on precision.
Published 2025Subjects: -
20